بدائل البحث:
models algorithm » mould algorithm (توسيع البحث), deer algorithm (توسيع البحث)
using algorithms » cosine algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
element » elements (توسيع البحث)
models algorithm » mould algorithm (توسيع البحث), deer algorithm (توسيع البحث)
using algorithms » cosine algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
element » elements (توسيع البحث)
-
101
-
102
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
منشور في 2024"…Moreover, the DBRF classification model is deployed to categorize the normal and attacking data flows using optimized features. …"
-
103
-
104
-
105
Eye-Clustering: An Enhanced Centroids Prediction for K-means Algorithm
منشور في 2024"…Hundreds of such labeled graphs were used to train the model to predict the location of centroids. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
106
-
107
Data mining approach to predict student's selection of program majors
منشور في 2019"…The approach includes a methodology to manage data mining projects, sampling techniques to handle imbalanced data and multiclass data, a set of classification algorithms to predict and measures to evaluate performance of models. …"
احصل على النص الكامل
-
108
A Hash-Based Assessment and Recovery Algorithm for Distributed Healthcare Systems Using Blockchain Technology
منشور في 2020"…Numerous damage assessment and recovery algorithms have been proposed in the literature. In this work, we present a distributed algorithm that uses blockchain technology and hash tables to solve the information warfare problem in healthcare systems. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
109
Methodology for Analyzing the Traditional Algorithms Performance of User Reviews Using Machine Learning Techniques
منشور في 2020"…This conclusion was achieved after preprocessing a number of data values from these data sets.</p><h2>Other Information</h2><p dir="ltr">Published in: Algorithms<br>License: <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.3390/a13080202" target="_blank">https://dx.doi.org/10.3390/a13080202</a></p>…"
-
110
Properties of simulated annealing and genetic algorithms for mapping data to multicomputers
منشور في 1997"…Some user parameters are included in the objective function and are architecture- or problem-dependent parameters. The others are used in the GA and SA algorithms. The fault tolerance capability is demonstrated by mapping data to a multicomputer with some faulty processors. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
111
-
112
Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques
منشور في 2020"…The obtained results illustrate the efficacy of the proposed algorithm to analyze the time series data from the IoT devices for spam detection.…"
-
113
Parallel physical optimization algorithms for allocating data to multicomputer nodes
منشور في 1994"…Three parallel physical optimization algorithms for allocating irregular data to multicomputer nodes are presented. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
114
-
115
Use data Mining Techniques to Predict Users’ Engagement on the Social Network Posts in The Period Before, During and After Ramadan
منشور في 2017"…Different classification algorithms were applied to the dataset using the Rapidminer tool. …"
احصل على النص الكامل
-
116
Augmented arithmetic optimization algorithm using opposite-based learning and lévy flight distribution for global optimization and data clustering
منشور في 2022"…This paper proposes a new data clustering method using the advantages of metaheuristic (MH) optimization algorithms. …"
-
117
Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm
منشور في 2022"…Moreover, the image pixels in different and more similar areas of the image are located next to one another in a group and classified using the specified thresholds. As a result, the embedding capacity in each class can increase by reducing the value of the difference between two consecutive pixels, and the distortion of the marked image can decrease after inserting the personal data using the DE method. …"
احصل على النص الكامل
-
118
Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms
منشور في 2022"…The outcomes revealed that these ML algorithms can be useful in predicting ground losses during wild blueberry harvesting in the selected fields.…"
-
119
Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT
منشور في 2021"…This paper proposes an Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT. …"
-
120
QU-GM: An IoT Based Glucose Monitoring System From Photoplethysmography, Blood Pressure, and Demographic Data Using Machine Learning
منشور في 2024"…Furthermore, the proposed models were deployed in Amazon Web Server. The wristband is connected to an Android mobile application to collect real-time data and update the estimated glucose and diabetic severity every 10-seconds, which will allow the users to gain better control of their diabetic health.…"