بدائل البحث:
colon algorithm » colony algorithm (توسيع البحث), cosine algorithm (توسيع البحث), carlo algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
data finding » data mining (توسيع البحث), data hiding (توسيع البحث)
colon algorithm » colony algorithm (توسيع البحث), cosine algorithm (توسيع البحث), carlo algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
data finding » data mining (توسيع البحث), data hiding (توسيع البحث)
-
61
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
منشور في 2007"…To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. Since even segmenting the log into clusters may not solve the problem, as clusters/segments may grow to be humongous in size, this is in case of high data/transaction dependency, we suggest a method for segmenting the log into clusters and its sub-clusters; i.e, segmenting the cluster; based on exact data dependency [12], into sub-clusters; based on two different criteria: number of data items or space occupied. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
62
Molecular Classification of Breast Cancer Utilizing Long Non-Coding RNA (lncRNA) Transcriptomes Identifies Novel Diagnostic lncRNA Panel for Triple-Negative Breast Cancer
منشور في 2021"…The ENST00000671612.1 lncRNA transcript correlated with worse refractory free survival (RFS). Our data provides a step towards finding a novel diagnostic lncRNA-based panel for TNBC with potential therapeutic implications.…"
-
63
-
64
Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE
منشور في 2018"…We examined different feature selection methods and classification algorithms to find the best prediction model with the highest accuracy. …"
احصل على النص الكامل
-
65
-
66
Implementation and Comparison of Particle Swarm Optimization and Genetic Algorithm Techniques in Combined Economic Emission Dispatch of an Independent Power Plant
منشور في 2019"…The results are of great significance as the real data of an IPP is used and imply that the performance of PSO is better than that of GA in case of CEED for finding the optimal solution concerning fuel cost, emission, convergence characteristics, and computational time. …"
-
67
-
68
-
69
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
منشور في 2022"…Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …"
-
70
Performance of artificial intelligence models in estimating blood glucose level among diabetic patients using non-invasive wearable device data
منشور في 2023"…One of the key aspects of WDs with machine learning (ML) algorithms is to find specific data signatures, called Digital biomarkers, that can be used in classification or gaging the extent of the underlying condition. …"
-
71
-
72
-
73
Practical Multiple Node Failure Recovery in Distributed Storage Systems
منشور في 2016"…The fractional repetition (FR) code is a class of regenerating codes that consists of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
74
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
منشور في 2022"…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …"
-
75
Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE
منشور في 2020"…The data analytics maturity model is used as the conceptual model for evaluating both data analytics and data governance in this research. …"
احصل على النص الكامل
-
76
-
77
Information warfare recovery-fighting back through the matrix. (c2012)
منشور في 2012احصل على النص الكامل
احصل على النص الكامل
masterThesis -
78
C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments
منشور في 2023"…The aim of streaming conformance checking is to find dis crepancies between process executions on streaming data and the refer ence process model. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
79
-
80
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
منشور في 2023"…Therefore, the suggested approach finds the main hole in undersea systems and fills it using robotic automation. …"