بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
data finding » data mining (توسيع البحث), data hiding (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
data finding » data mining (توسيع البحث), data hiding (توسيع البحث)
-
41
-
42
Parallel physical optimization algorithms for allocating data to multicomputer nodes
منشور في 1994"…Three parallel physical optimization algorithms for allocating irregular data to multicomputer nodes are presented. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
43
Physical optimization algorithms for mapping data to distributed-memory multiprocessors
منشور في 1992"…We present three parallel physical optimization algorithms for mapping data to distributed-memory multiprocessors, concentrating on irregular loosely synchronous problems. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
44
-
45
A comparison of data mapping algorithms for parallel iterative PDE solvers
منشور في 1995"…We review and evaluate the performances of six data mapping algorithms used for parallel single-phase iterative PDE solvers with irregular 2-dimensional meshes on multicomputers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
46
Extended Behavioral Modeling of FET and Lattice-Mismatched HEMT Devices
منشور في 2016الموضوعات: احصل على النص الكامل
doctoralThesis -
47
-
48
Cryptocurrency Exchange Market Prediction and Analysis Using Data Mining and Artificial Intelligence
منشور في 2020"…One of the best algorithms in terms of the result is the Long Short Term Memory (LSTM) since it is based on recurrent neural networks which uses loop as a method to learn from heuristics data. …"
احصل على النص الكامل
-
49
UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices
منشور في 2019"…Then, we develop an effective sub-optimal algorithm based on successive convex approximation in order to obtain results for larger network scenarios. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
50
A data envelopment analysis model for opinion leaders’ identification in social networks
منشور في 2024"…Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. …"
-
51
-
52
BioNetApp: An interactive visual data analysis platform for molecular expressions
منشور في 2019"…BioNetApp also provides data clustering based on molecular concentrations using Self Organizing Maps (SOM), K-Means, K-Medoids, and Farthest First algorithms.…"
-
53
-
54
-
55
-
56
GenDE: A CRF-Based Data Extractor
منشور في 2020"…The experiments show an encouraging result as it outperforms the CSP-based extractor algorithm (95% and 96% of recall and precision, respectively). …"
احصل على النص الكامل
احصل على النص الكامل
-
57
Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn...
منشور في 2020"…A special consideration was given to data pre-processing and dimensionality reduction such Chi Squared (CS) and Recursive Feature Elimination (RFE) to improve progressively the proposed models performance. …"
احصل على النص الكامل
-
58
-
59
A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems
منشور في 2025"…<p dir="ltr">Federated Learning (FL) is gaining traction in Android-based consumer electronics, enabling collaborative model training across decentralized devices while preserving data privacy. …"
-
60
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
منشور في 2007"…To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. Since even segmenting the log into clusters may not solve the problem, as clusters/segments may grow to be humongous in size, this is in case of high data/transaction dependency, we suggest a method for segmenting the log into clusters and its sub-clusters; i.e, segmenting the cluster; based on exact data dependency [12], into sub-clusters; based on two different criteria: number of data items or space occupied. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article