Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
Showing 201 - 220 results of 747 for search '(((( data processing algorithm ) OR ( data using algorithm ))) OR ( elements method algorithm ))', query time: 0.15s Refine Results
  1. 201
  2. 202

    Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques by Ameema Zainab (16864263)

    Published 2020
    “…The obtained results illustrate the efficacy of the proposed algorithm to analyze the time series data from the IoT devices for spam detection.…”
  3. 203

    Severity-Based Prioritized Processing of Packets with Application in VANETs by Ala Al-Fuqaha (4434340)

    Published 2019
    “…In this study, we propose a generic prioritization and resource management algorithm that can be used to prioritize processing of received packets in vehicular networks. …”
  4. 204
  5. 205
  6. 206
  7. 207
  8. 208

    BUC algorithm for iceberg cubes by Nasr, George E.

    Published 2003
    “…The Uniform distribution is used as a basis for comparison. Results show that when the cube is sparse there is a correlation between the data distribution and the running time of the algorithm. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 209

    TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection by Zina Chkirbene (16869987)

    Published 2020
    “…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …”
  10. 210
  11. 211
  12. 212

    Automatic and Intelligent Stressor Identification Based on Photoplethysmography Analysis by Sami Elzeiny (16891521)

    Published 2021
    “…In particular, this study proposes a novel algorithm that first detects instances of stress and then classifies the stressor type using photoplethysmography (PPG) data from wearable smartwatches. …”
  13. 213

    Use data Mining Techniques to Predict Users’ Engagement on the Social Network Posts in The Period Before, During and After Ramadan by AL RAWASHDEH, HANEEN MOHAMMAD

    Published 2017
    “…Different classification algorithms were applied to the dataset using the Rapidminer tool. …”
    Get full text
  14. 214

    Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation by Hariprasath Manoharan (14157966)

    Published 2023
    “…<p dir="ltr">The process of using robotic technology to examine underwater systems is still a difficult undertaking because the majority of automated activities lack network connectivity. …”
  15. 215

    The use of multi-task learning in cybersecurity applications: a systematic literature review by Shimaa Ibrahim (22155739)

    Published 2024
    “…Five critical applications, such as network intrusion detection and malware detection, were identified, and several tasks used in these applications were observed. Most of the studies used supervised learning algorithms, and there were very limited studies that focused on other types of machine learning. …”
  16. 216

    Fast Transient Stability Assessment of Power Systems Using Optimized Temporal Convolutional Networks by Mohamed Massaoudi (16888710)

    Published 2024
    “…The proposed algorithm unlocks scalability and system adaptability to operational variability by adopting numeric imputation and missing-data-tolerant techniques. …”
  17. 217

    Correlation Clustering with Overlaps by Fakhereldine, Amin

    Published 2020
    “…In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  18. 218

    Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT by Arumugam K (18456690)

    Published 2021
    “…This paper proposes an Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT. …”
  19. 219
  20. 220

    Defining quantitative rules for identifying influential researchers: Insights from mathematics domain by Ghulam Mustafa (458105)

    Published 2024
    “…The rules were developed for each parameter category using the Decision Tree Algorithm, which achieved an average accuracy of 70 to 75 percent for identifying awardees in mathematics domains. …”