Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
data detection » data injection (Expand Search)
data modeling » data models (Expand Search), spatial modeling (Expand Search)
element » elements (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
data detection » data injection (Expand Search)
data modeling » data models (Expand Search), spatial modeling (Expand Search)
element » elements (Expand Search)
-
1
Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm
Published 2023“…Furthermore, a route management technique is combined with Artificial Intelligence (AI) algorithm to transmit the data to appropriate central servers. …”
-
2
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…In addition, the framework outperforms conventional detection algorithms in words of detection rate, the rate of the false positive, and calculation time, respectively.…”
Get full text
Get full text
-
3
A data envelopment analysis model for opinion leaders’ identification in social networks
Published 2024“…Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. …”
-
4
An Effective Hash Based Assessment and Recovery Algorithm for Healthcare Systems
Published 2019“…Finally, the experimental results prove the improvements provided by our hash based algorithm over previously suggested models.…”
Get full text
Get full text
Get full text
masterThesis -
5
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …”
Get full text
-
6
-
7
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Published 2022“…To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …”
-
8
Interval-Valued SVM Based ABO for Fault Detection and Diagnosis of Wind Energy Conversion Systems
Published 2022Subjects: -
9
-
10
-
11
GenDE: A CRF-Based Data Extractor
Published 2020“…Web site schema detection and data extraction from the Deep Web have been studied a lot. …”
Get full text
Get full text
-
12
The effects of data balancing approaches: A case study
Published 2023“…In this research, classification algorithms, combined with resampling strategies and dimensionality reduction methods, were investigated to find a prediction model to correctly identify the samples of treated animals. …”
-
13
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
Published 2020“…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …”
-
14
Bird’s Eye View feature selection for high-dimensional data
Published 2023“…However, high dimensional data often contains irrelevant features, outliers, and noise, which can negatively impact model performance and consume computational resources. …”
-
15
-
16
Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem
Published 2016“…This research note describes Response-Based Unit Segmentation (REBUS), a “latent class detection” technique used in partial least squares–structural equation modeling (PLS-SEM) to examine data heterogeneity. …”
Get full text
Get full text
Get full text
Get full text
article -
17
Efficient Approximate Conformance Checking Using Trie Data Structures
Published 2021Subjects: “…Estimation error,Runtime,Computational modeling,Data structures,Approximation algorithms,Encoding,Computational efficiency…”
Get full text
Get full text
Get full text
-
18
Cyberbullying Detection and Abuser Profile Identification on Social Media for Roman Urdu
Published 2024Subjects: -
19
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
Published 2024“…Exploratory Data Analysis (EDA) highlights the class imbalance problem in detecting fake jobs, which tends the model to act aggressively toward the minority class. …”
-
20
Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques
Published 2020“…The obtained results illustrate the efficacy of the proposed algorithm to analyze the time series data from the IoT devices for spam detection.…”