Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
-
121
-
122
A method for data path synthesis using neural networks
Published 2017“…The method is based on the modified Hopfield neural network model of computation and the McCulloch-Pitts binary neuron model. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
123
Indexing Arabic texts using association rule data mining
Published 2019“…Purpose The purpose of this paper is to propose a new model to enhance auto-indexing Arabic texts. The model denotes extracting new relevant words by relating those chosen by previous classical methods to new words using data mining rules. …”
Get full text
Get full text
Get full text
Get full text
article -
124
Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE
Published 2018“…We examined different feature selection methods and classification algorithms to find the best prediction model with the highest accuracy. …”
Get full text
-
125
Optimization of Commercially Off the Shelf (COTS) Electric Propulsion System for Low Speed Fuel Cell UAV
Published 2013Get full text
doctoralThesis -
126
An efficient approach for textual data classification using deep learning
Published 2022“…<p dir="ltr">Text categorization is an effective activity that can be accomplished using a variety of classification algorithms. In machine learning, the classifier is built by learning the features of categories from a set of preset training data. …”
-
127
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…The method used in this research is a classification of models and algorithms used in data mining. …”
Get full text
-
128
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
Published 2022“…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
-
129
A Graph Heuristic Approach for the Data Path Allocation Problem
Published 2022Get full text
Get full text
Get full text
masterThesis -
130
A data envelopment analysis model for opinion leaders’ identification in social networks
Published 2024“…Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. …”
-
131
Data Embedding in HEVC Video by Modifying the Partitioning of Coding Units
Published 2019“…The flags pertaining to 16x16 sub CUs are used as a cover for data embedding, where 6 or 4 message bits are embedded per CU. …”
Get full text
article -
132
Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn...
Published 2020“…LR with the reduced feature set using the intersection between CS and RFE proved to be the best model among the tested algorithms. …”
Get full text
-
133
Enhanced PSO-Based NN for Failures Detection in Uncertain Wind Energy Systems
Published 2023“…First, a feature selection tool using PSO Algorithm is developed. Then, in order to maximize the diversity between data samples and improve the effectiveness of using PSO algorithm for feature selection, the Euclidean distance metric is used in order to reduce the data and maximize the diversity between data samples. …”
-
134
A Novel Fault Diagnosis of Uncertain Systems Based on Interval Gaussian Process Regression: Application to Wind Energy Conversion Systems
Published 2020“…In the proposed IGPR-RF technique, the effective interval-valued nonlinear statistical features are extracted and selected using the IGPR model and then fed to the RF algorithm for fault classification purposes. …”
-
135
Unsupervised Deep Learning for Classification Of Bats Calls Using Acoustic Data
Published 2021Get full text
doctoralThesis -
136
The Detection of Dysarthria Severity Levels Using AI Models: A Review
Published 2024Subjects: “…artificial intelligence (AI)-based models…”
-
137
Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing
Published 2023“…This paper provides a comparative analysis of various metaheuristic load balancing algorithms for cloud computing based on performance factors i.e., Makespan time, degree of imbalance, response time, data center processing time, flow time, and resource utilization. …”
-
138
L-2 Gap-Metric-Based Identification Algorithms For Linear Feedback Systems
Published 2020Get full text
article -
139
NOVEL STACKING CLASSIFICATION AND PREDICTION ALGORITHM BASED AMBIENT ASSISTED LIVING FOR ELDERLY
Published 2022“…Therefore, this thesis proposed a Novel Stacking Classification and Prediction (NSCP) algorithm based on AAL for the older people with Multi-strategy Combination based Feature Selection (MCFS) and Novel Clustering Aggregation (NCA) algorithms. …”
Get full text
-
140
Customs Trade Facilitation and Compliance for Ecommerce using Blockchain and Data Mining
Published 2021“…Additionally, the Cross Industry Standard Process for Data Mining (CRISP-DM) methodology is employed for modelling the two proposed clustering algorithms to identify transactional risks. …”
Get full text