بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
data fitting » data mining (توسيع البحث), data hiding (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
data fitting » data mining (توسيع البحث), data hiding (توسيع البحث)
-
261
Implementation and Comparison of Particle Swarm Optimization and Genetic Algorithm Techniques in Combined Economic Emission Dispatch of an Independent Power Plant
منشور في 2019"…The results are of great significance as the real data of an IPP is used and imply that the performance of PSO is better than that of GA in case of CEED for finding the optimal solution concerning fuel cost, emission, convergence characteristics, and computational time. …"
-
262
Distributed Tree-Based Machine Learning for Short-Term Load Forecasting With Apache Spark
منشور في 2021"…The paper proposes a concurrent job scheduling algorithm in a multi-energy data source environment using Apache Spark. …"
-
263
Brain Source Localization in the Presence of Leadfield Perturbations
منشور في 2015احصل على النص الكامل
doctoralThesis -
264
Random Forest Bagging and X‐Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data
منشور في 2021"…<p dir="ltr">In the current ongoing crisis, people mostly rely on mobile phones for all the activities, but query analysis and mobile data security are major issues. Several research works have been made on efficient detection of antipatterns for minimizing the complexity of query analysis. …"
-
265
Software defect prediction. (c2019)
منشور في 2019احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
266
-
267
Performance Prediction Using Classification
منشور في 2019"…The use of classification as a data mining approach for performance prediction has been studied by many eminent researchers. …"
احصل على النص الكامل
-
268
VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems
منشور في 2019"…The Nonnested Generalized Exemplars (NNGE) algorithm is one of the most accurate classification techniques that can work with such data of CPPS. …"
-
269
Sentiment analysis for Arabizi in social media. (c2015)
منشور في 2015"…We took the initiative to make use of this abundance of data by analyzing it and predicting sentiment. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
270
Scatter search for protein structure prediction. (c2008)
منشور في 2008احصل على النص الكامل
احصل على النص الكامل
masterThesis -
271
Finetuning Analytics Information Systems for a Better Understanding of Users: Evidence of Personification Bias on Multiple Digital Channels
منشور في 2023"…The results show that despite using the same data and algorithm, varying the number of personas strongly biases the information system’s personification of the user population. …"
-
272
-
273
Land Use/Land Cover Changes Impact on Groundwater Level and Quality in the Northern Part of the United Arab Emirates
منشور في 2020"…Each pair of enhanced LULC maps (1990–2000, 2000–2010, 2010–2018, and 1990–2018) were used as input data for an image difference algorithm to monitor LULC changes. …"
احصل على النص الكامل
article -
274
-
275
Large-scale annotation dataset for fetal head biometry in ultrasound images
منشور في 2023"…The dataset was assembled under the Creative Commons Attribution 4.0 International license, using previously anonymized and de-identified images to maintain ethical standards. …"
-
276
A Fuzzy Low-Dimensional Intersection Graph Representation Approach for Graph Compression and Anonymization
منشور في 2021"…The large amount of data represented as a network, or graph, sometimes exceeds the resources of a conventional computing device. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
277
Degree-Based Network Anonymization
منشور في 2020"…Our thorough experimental studies provide empirical evidence of the effectiveness of the new approach; by specifically showing that the introduced anonymization algorithm has a negligible effect on the way nodes are clustered, thereby preserving valuable network information while significantly improving the data privacy.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
278
-
279
-
280