يعرض 161 - 180 نتائج من 595 نتيجة بحث عن '(((( data processing algorithm ) OR ( data modeling algorithm ))) OR ( elements ii algorithm ))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 161
  2. 162
  3. 163
  4. 164

    C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments حسب Raun, Kristo

    منشور في 2023
    "…The aim of streaming conformance checking is to find dis crepancies between process executions on streaming data and the refer ence process model. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  5. 165

    A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks حسب Umesh Kumar Lilhore (17727684)

    منشور في 2022
    "…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …"
  6. 166
  7. 167
  8. 168

    Performance of artificial intelligence models in estimating blood glucose level among diabetic patients using non-invasive wearable device data حسب Arfan Ahmed (17541309)

    منشور في 2023
    "…Our experimental design included Data Collection, Feature Engineering, ML model selection/development, and reporting evaluation of metrics.…"
  9. 169

    Automatic and Intelligent Stressor Identification Based on Photoplethysmography Analysis حسب Sami Elzeiny (16891521)

    منشور في 2021
    "…This work leverages the output of wearable technology to provide automatic stress and stressor identification model. In particular, this study proposes a novel algorithm that first detects instances of stress and then classifies the stressor type using photoplethysmography (PPG) data from wearable smartwatches. …"
  10. 170

    Random Forest Bagging and X‐Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data حسب Rajesh Kumar Dhanaraj (19646269)

    منشور في 2021
    "…In addition, for grouping similar antipatterns, a clustering process was performed to eradicate the design errors. …"
  11. 171

    Severity-Based Prioritized Processing of Packets with Application in VANETs حسب Ala Al-Fuqaha (4434340)

    منشور في 2019
    "…In this study, we propose a generic prioritization and resource management algorithm that can be used to prioritize processing of received packets in vehicular networks. …"
  12. 172

    Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation حسب Hariprasath Manoharan (14157966)

    منشور في 2023
    "…Additionally, a clustering algorithm with a fuzzy membership function is implemented, allowing the robots to advance in accordance with predefined clusters and arrive at their starting place within a predetermined amount of time. …"
  13. 173

    Short-Term Load Forecasting in Active Distribution Networks Using Forgetting Factor Adaptive Extended Kalman Filter حسب Mena S. ElMenshawy (17983807)

    منشور في 2023
    "…A few research studies focused on developing data filtering algorithm for the load forecasting process using approaches such as Kalman filter, which has good tracking capability in the presence of noise in the data collection process. …"
  14. 174

    Predict Student Success and Performance factors by analyzing educational data using data mining techniques حسب ATIF, MUHAMMAD

    منشور في 2022
    "…The model is then applied to data collected from a reputable university that included 126,698 records with twenty-six (26) initial data attributes. …"
    احصل على النص الكامل
  15. 175

    Defining quantitative rules for identifying influential researchers: Insights from mathematics domain حسب Ghulam Mustafa (458105)

    منشور في 2024
    "…Within each categorical grouping, we meticulously selected the five most pivotal parameters. This selection process was guided by an importance score, that was derived after assessing its influence on the model's performance in the classification of data pertaining to both awardees and non awardees. …"
  16. 176
  17. 177
  18. 178

    Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey حسب Faria Nawshin (21841598)

    منشور في 2024
    "…As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. There are many machine-learning and deep-learning algorithms have been developed by researchers. …"
  19. 179

    Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation حسب Fawaz Kserawi (16904859)

    منشور في 2022
    "…We describe our differentially-private model with flexible constraints and a dynamic window algorithm to maintain the privacy-budget loss in infinitely generated time-series data. …"
  20. 180

    Bee Colony Algorithm for Proctors Assignment. حسب Mansour, Nashat

    منشور في 2015
    "…The Bee Colony algorithm is a recent population-based search algorithm that mimics the natural behavior of swarms of honey bees during the process of collecting food. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article