Search alternatives:
learning algorithm » learning algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
data learning » deep learning (Expand Search)
element » elements (Expand Search)
Showing 161 - 180 results of 629 for search '(((( data based algorithm ) OR ( data learning algorithm ))) OR ( element method algorithm ))*', query time: 0.12s Refine Results
  1. 161

    Gradient-Based Optimizer (GBO): A Review, Theory, Variants, and Applications by Daoud, Mohammad Sh.

    Published 2023
    “…This paper introduces a comprehensive survey of a new population-based algorithm so-called gradient-based optimizer (GBO) and analyzes its major features. …”
    Get full text
  2. 162
  3. 163
  4. 164
  5. 165
  6. 166

    KNNOR: An oversampling technique for imbalanced datasets by Ashhadul Islam (16869981)

    Published 2021
    “…<p>Predictive performance of Machine Learning (ML) models rely on the quality of data used for training the models. …”
  7. 167

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group by Iqtadar Hussain (14147850)

    Published 2023
    “…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …”
  8. 168

    A Low-Cost Closed-Loop Solar Tracking System Based on the Sun Position Algorithm by E. H. Chowdhury (545276)

    Published 2019
    “…In contrast, the sun position algorithms use mathematical formula or astronomical data to obtain the station of the sun at a particular geographical location and time. …”
  9. 169

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
    Get full text
  10. 170
  11. 171

    The use of multi-task learning in cybersecurity applications: a systematic literature review by Shimaa Ibrahim (22155739)

    Published 2024
    “…Most of the studies used supervised learning algorithms, and there were very limited studies that focused on other types of machine learning. …”
  12. 172
  13. 173

    Android Malware Detection Using Machine Learning by Al Ali, Shaikha

    Published 2024
    “…This paper presents a machine learning approach for Android malware detection. In this work, several machine learning algorithms were utilized, namely k-Nearest neighbor (KNN), Decision Trees (DT), Naive Bayes (NB), Support Vector Machine (SVM) and other ensemble classifiers including Extreme Gradient Boosting (XGBoost), Light Gradient Boosting Machine (LGBM) and CatBoost. …”
    Get full text
    article
  14. 174
  15. 175

    Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform by Hamed Al-Shaibani (19497412)

    Published 2022
    “…Furthermore, to assess the overhead of the proposed privacy algorithms on the trading execution time, we conduct several experiments considering different anonymity levels <i>k</i> . …”
  16. 176
  17. 177

    Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem by Assaker, Guy

    Published 2016
    “…This research note describes Response-Based Unit Segmentation (REBUS), a “latent class detection” technique used in partial least squares–structural equation modeling (PLS-SEM) to examine data heterogeneity. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  18. 178
  19. 179

    Interval-Valued SVM Based ABO for Fault Detection and Diagnosis of Wind Energy Conversion Systems by Majdi Mansouri (16869885)

    Published 2022
    “…The proposed improved ABO method consists in reducing the number of samples in the training data set using the Euclidean distance and extracting the most significant features from the reduced data using ABO algorithm. …”
  20. 180