يعرض 61 - 80 نتائج من 185 نتيجة بحث عن '(((( data code algorithm ) OR ( data finding algorithm ))) OR ( elements carlo algorithm ))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 61

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare حسب Haraty, Ramzi A.

    منشور في 2007
    "…To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. Since even segmenting the log into clusters may not solve the problem, as clusters/segments may grow to be humongous in size, this is in case of high data/transaction dependency, we suggest a method for segmenting the log into clusters and its sub-clusters; i.e, segmenting the cluster; based on exact data dependency [12], into sub-clusters; based on two different criteria: number of data items or space occupied. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 62

    Molecular Classification of Breast Cancer Utilizing Long Non-Coding RNA (lncRNA) Transcriptomes Identifies Novel Diagnostic lncRNA Panel for Triple-Negative Breast Cancer حسب Hibah Shaath (5599658)

    منشور في 2021
    "…The ENST00000671612.1 lncRNA transcript correlated with worse refractory free survival (RFS). Our data provides a step towards finding a novel diagnostic lncRNA-based panel for TNBC with potential therapeutic implications.…"
  3. 63
  4. 64

    Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE حسب SHWEDEH, FATEN

    منشور في 2018
    "…We examined different feature selection methods and classification algorithms to find the best prediction model with the highest accuracy. …"
    احصل على النص الكامل
  5. 65
  6. 66

    Implementation and Comparison of Particle Swarm Optimization and Genetic Algorithm Techniques in Combined Economic Emission Dispatch of an Independent Power Plant حسب Shahbaz Hussain (9765320)

    منشور في 2019
    "…The results are of great significance as the real data of an IPP is used and imply that the performance of PSO is better than that of GA in case of CEED for finding the optimal solution concerning fuel cost, emission, convergence characteristics, and computational time. …"
  7. 67
  8. 68
  9. 69

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method حسب Amit Kumar Balyan (18288964)

    منشور في 2022
    "…Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …"
  10. 70

    Performance of artificial intelligence models in estimating blood glucose level among diabetic patients using non-invasive wearable device data حسب Arfan Ahmed (17541309)

    منشور في 2023
    "…One of the key aspects of WDs with machine learning (ML) algorithms is to find specific data signatures, called Digital biomarkers, that can be used in classification or gaging the extent of the underlying condition. …"
  11. 71
  12. 72
  13. 73

    Practical Multiple Node Failure Recovery in Distributed Storage Systems حسب Itani, M.

    منشور في 2016
    "…The fractional repetition (FR) code is a class of regenerating codes that consists of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  14. 74

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method حسب Shahid Rahman (16904613)

    منشور في 2022
    "…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …"
  15. 75

    Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE حسب Mathew, Elezabeth

    منشور في 2020
    "…The data analytics maturity model is used as the conceptual model for evaluating both data analytics and data governance in this research. …"
    احصل على النص الكامل
  16. 76
  17. 77
  18. 78

    C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments حسب Raun, Kristo

    منشور في 2023
    "…The aim of streaming conformance checking is to find dis crepancies between process executions on streaming data and the refer ence process model. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  19. 79
  20. 80

    Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation حسب Hariprasath Manoharan (14157966)

    منشور في 2023
    "…Therefore, the suggested approach finds the main hole in undersea systems and fills it using robotic automation. …"