بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
modelling algorithm » scheduling algorithm (توسيع البحث)
element » elements (توسيع البحث)
update » updated (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
modelling algorithm » scheduling algorithm (توسيع البحث)
element » elements (توسيع البحث)
update » updated (توسيع البحث)
-
161
Design and Analysis of Secure Digital Twin Architecture
منشور في 2022احصل على النص الكامل
doctoralThesis -
162
Random Forest Bagging and X‐Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data
منشور في 2021"…In addition, for grouping similar antipatterns, a clustering process was performed to eradicate the design errors. …"
-
163
Severity-Based Prioritized Processing of Packets with Application in VANETs
منشور في 2019"…In this study, we propose a generic prioritization and resource management algorithm that can be used to prioritize processing of received packets in vehicular networks. …"
-
164
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
منشور في 2023"…Additionally, a clustering algorithm with a fuzzy membership function is implemented, allowing the robots to advance in accordance with predefined clusters and arrive at their starting place within a predetermined amount of time. …"
-
165
Short-Term Load Forecasting in Active Distribution Networks Using Forgetting Factor Adaptive Extended Kalman Filter
منشور في 2023"…A few research studies focused on developing data filtering algorithm for the load forecasting process using approaches such as Kalman filter, which has good tracking capability in the presence of noise in the data collection process. …"
-
166
Predict Student Success and Performance factors by analyzing educational data using data mining techniques
منشور في 2022"…The model is then applied to data collected from a reputable university that included 126,698 records with twenty-six (26) initial data attributes. …"
احصل على النص الكامل
-
167
Defining quantitative rules for identifying influential researchers: Insights from mathematics domain
منشور في 2024"…Within each categorical grouping, we meticulously selected the five most pivotal parameters. This selection process was guided by an importance score, that was derived after assessing its influence on the model's performance in the classification of data pertaining to both awardees and non awardees. …"
-
168
Modelling of pollutant transport in compound open channels
منشور في 1998"…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
169
-
170
Label dependency modeling in Multi-Label Naïve Bayes through input space expansion
منشور في 2024"…To accommodate the heterogeneity of the expanded input space, we refine the likelihood parameters of iMLNB using a joint density function, which is adept at handling the amalgamation of data types. We subject our enhanced iMLNB model to a rigorous empirical evaluation, utilizing six benchmark datasets. …"
-
171
-
172
Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation
منشور في 2022"…We describe our differentially-private model with flexible constraints and a dynamic window algorithm to maintain the privacy-budget loss in infinitely generated time-series data. …"
-
173
Bee Colony Algorithm for Proctors Assignment.
منشور في 2015"…The Bee Colony algorithm is a recent population-based search algorithm that mimics the natural behavior of swarms of honey bees during the process of collecting food. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
174
Oversampling techniques for imbalanced data in regression
منشور في 2024"…For tabular data we conducted a comprehensive experiment using various models trained on both augmented and non-augmented datasets, followed by performance comparisons on test data. …"
-
175
-
176
-
177
Process Mining over Unordered Event Streams
منشور في 2020"…This requires online algorithms that, instead of keeping the whole history of event data, work incrementally and update analysis results upon the arrival of new events. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
178
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
منشور في 2022"…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …"
-
179
-
180
Three approaches to modelling heating and evaporation of monocomponent droplets
منشور في 2024"…It is shown that the algorithm for the third approach predicts values which are close to the experimental data.…"