بدائل البحث:
making algorithm » cosine algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
ipca algorithm » jaya algorithm (توسيع البحث)
data making » data mining (توسيع البحث)
element » elements (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
ipca algorithm » jaya algorithm (توسيع البحث)
data making » data mining (توسيع البحث)
element » elements (توسيع البحث)
-
181
Learning Spatiotemporal Latent Factors of Traffic via Regularized Tensor Factorization: Imputing Missing Values and Forecasting
منشور في 2019"…And while spatiotemporal data related to traffic is becoming common place due to the wide availability of cheap sensors and the rapid deployment of IoT platforms, the data still suffer some challenges related to sparsity, incompleteness, and noise which makes the traffic analytics difficult. …"
-
182
A geographic information system method to generate long term regional solar radiation resource maps: enhancing decision-making
منشور في 2024"…The regression-kriging algorithm and its variants are used to calibrate satellite data, through interpolation of ground solar radiation data. …"
-
183
Intelligent Bilateral Client Selection in Federated Learning Using Game Theory
منشور في 2022"…To overcome this problem, we present in this paper FedMint, an intelligent client selection approach for federated learning on IoT devices using game theory and bootstrapping mechanism. Our solution involves designing (1) preference functions for the client IoT devices and federated servers to allow them to rank each other according to several factors such as accuracy and price, (2) intelligent matching algorithms that take into account the preferences of both parties in their design, and (3) bootstrapping technique that capitalizes on the collaboration of multiple federated servers in order to assign initial accuracy value for the new connected IoT devices. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
184
-
185
Convergence behavior of the normalized least mean fourth algorithm
منشور في 2000"…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …"
احصل على النص الكامل
احصل على النص الكامل
article -
186
Optimizing Document Classification: Unleashing the Power of Genetic Algorithms
منشور في 2023"…Additionally, our proposed model optimizes the features using a genetic algorithm. Optimal feature selection performances a crucial role in this domain, enhancing the overall accuracy of the document classification system while reducing the time complexity associated with selecting the most relevant features from this large-dimensional space. …"
-
187
Evolutionary algorithm for predicting all-atom protein structure
منشور في 2011"…We present an improved version of a scatter search (SS) algorithm for predicting all-atoms protein structures using a recent energy model. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
188
GenDE: A CRF-Based Data Extractor
منشور في 2020"…If the wrapper failed to work with the new page, a new wrapper/schema would be re-generated by calling an unsupervised wrapper induction system. In this paper, a new data extractor called GenDE is proposed. It verifies the site schema and extracts data from the Web pages using Conditional Random Fields (CRFs). …"
احصل على النص الكامل
احصل على النص الكامل
-
189
Three-phase simulated annealing algorithms for exam scheduling
منشور في 2003"…We empirically compare 3PSA with a 4-phase clustering-based heuristic algorithm using realistic data. Our experimental results show that 3PSA produces good exam schedules, which are better than those of the clustering heuristic procedure.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
190
Recent Advances of Chimp Optimization Algorithm: Variants and Applications
منشور في 2023"…Chimp Optimization Algorithm (ChOA) is one of the recent metaheuristics swarm intelligence methods. …"
احصل على النص الكامل
-
191
Mining airline data for CRM strategies. (c2006)
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
masterThesis -
192
A FAMILY OF NORMALIZED LEAST MEAN FOURTH ALGORITHMS
منشور في 2020"…In this work, a family of normalized least mean fourth algorithms is presented. Unlike the LMF algorithm, the convergence behavior of these algorithms is independent of the input data correlation statistics. …"
احصل على النص الكامل
article -
193
A hybrid graph representation for recursive backtracking algorithms
منشور في 2017"…The use of efficient data structures is necessary for fast graph modification modules as well as fast take-back procedures. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
194
Social spider optimization algorithm: survey and new applications
منشور في 2024"…This survey also studied the main applications of this algorithm in different fields, including medical, mathematical, artificial intelligence, engineering, and data engineering, and how this algorithm affected, impacted, and supported the different fields. …"
احصل على النص الكامل
-
195
-
196
Application of Data Mining to Predict and Diagnose Diabetic Retinopathy
منشور في 2024احصل على النص الكامل
doctoralThesis -
197
Global smart cities classification using a machine learning approach to evaluating livability, technology, and sustainability performance across key urban indices
منشور في 2025"…Drawing on data from the Smart Cities Index (SCI) and other economic and sustainability competitiveness metrics, the study uses various <u>ML algorithms</u> to categorize cities into <u>performance classes</u>, ranging from high-achieving Class 1 to emerging Class 3 cities. …"
-
198
IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture
منشور في 2025"…The IoMT manufacturers need to offer their products at a competitive price, which forces them to use simplified architecture, leaving limited and, to some extent, no scope to employ sophisticated cybersecurity algorithms. …"
-
199
A comparison of optimization heuristics for the data mapping problem
منشور في 1997"…In this paper we compare the performance of six heuristics with suboptimal solutions for the data mapping problem of two dimensional meshes that are used for the numerical solution of Partial Differential Equations(PDEs) on multicomputers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
200
Data redundancy management for leaf-edges in connected environments
منشور في 2022"…Although the sensed data could be useful for various applications (e.g., event detection in cities, energy management in commercial buildings), it first requires pre-processing to clean various inconsistencies (e.g., anomalies, redundancies, missing values). …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article