Search alternatives:
modelling algorithm » scheduling algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
data present » net present (Expand Search), past present (Expand Search)
element » elements (Expand Search)
Showing 301 - 320 results of 582 for search '(((( data present algorithm ) OR ( data modelling algorithm ))) OR ( element method algorithm ))', query time: 0.13s Refine Results
  1. 301

    Boosting the visibility of services in microservice architecture by Ahmet Vedat Tokmak (17773479)

    Published 2023
    “…In this research, we evaluate the performance of several classification algorithms for estimating the quality of microservices using the QWS dataset containing traffic data of 2505 microservices. …”
  2. 302
  3. 303

    Decomposition-based wind power forecasting models and their boundary issue: An in-depth review and comprehensive discussion on potential solutions by Yinsong Chen (16685508)

    Published 2022
    “…These methods generally disaggregate the original time series data into sub-time-series with better stationarity, and then the target data is predicted based on the sub-series. …”
  4. 304
  5. 305

    Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations by Mueen Uddin (4903510)

    Published 2025
    “…<p dir="ltr">Cyber threats are increasingly frequent in today’s world, posing challenges for organizations and individuals to protect their data from cybercriminals. On the other hand, Generative Artificial Intelligence (GAI) technology offers an efficient way to automatically address these issues with the help of AI models and algorithms. …”
  6. 306
  7. 307

    A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security by Shitharth Selvarajan (14157976)

    Published 2024
    “…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …”
  8. 308

    Performance Modeling of Rooftop PV Systems in Arid Climate, a Case Study for Qatar: Impact of Soiling Losses and Albedo Using PVsyst and SAM by Sachin Jain (19161721)

    Published 2025
    “…<p dir="ltr">This study presents a comparative performance modeling and optimization framework for a 5 kWp rooftop photovoltaic (PV) system in Qatar, using two widely adopted simulation tools, PVsyst and the System Advisor Model (SAM). …”
  9. 309

    A hybrid model to predict the pressure gradient for the liquid-liquid flow in both horizontal and inclined pipes for unknown flow patterns by Md Ferdous Wahid (13485799)

    Published 2023
    “…The first model (M1) determines the oil-water FP, whereas the second model (M2) predicts the oil-water PG. 1637 experimental data points for the oil-water flow in both horizontal and inclined pipes are used to develop the models. …”
  10. 310
  11. 311

    Predicting Plasma Vitamin C Using Machine Learning by Daniel Kirk (17302798)

    Published 2022
    “…The low R-squared scores obtained by the models are likely to be due to the low resolution of the NHANES data, particularly the dietary data. …”
  12. 312

    Information warfare. (c2015) by Sai, Mohamed El

    Published 2015
    “…Numerous damage assessment and recovery algorithms have been proposed by researchers. In this work we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
    Get full text
    Get full text
    masterThesis
  13. 313
  14. 314
  15. 315
  16. 316

    R-CONV++: uncovering privacy vulnerabilities through analytical gradient inversion attacks by Tamer Ahmed Eltaras (22565414)

    Published 2025
    “…The first algorithm presents a novel data leakage method that efficiently exploits convolutional layer gradients, demonstrating that even with non-fully invertible activation functions, such as ReLU, training samples can be analytically reconstructed directly from gradients without the need to reconstruct intermediate layer outputs. …”
  17. 317

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
    Get full text
  18. 318
  19. 319

    An App for Navigating Patient Transportation and Acute Stroke Care in Northwestern Ontario Using Machine Learning: Retrospective Study by Ayman Hassan (14426412)

    Published 2024
    “…The data were distributed for training (35%), testing (35%), and validation (30%) of the prediction model.…”
  20. 320

    Enhancing Breast Cancer Diagnosis With Bidirectional Recurrent Neural Networks: A Novel Approach for Histopathological Image Multi-Classification by Rajendra Babu Chikkala (22330876)

    Published 2025
    “…<p dir="ltr">In recent years, deep learning methods have dramatically improved medical image analysis, though earlier models faced difficulties in capturing intricate spatial and contextual details. …”