Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
Showing 161 - 180 results of 358 for search '(((( data processing algorithm ) OR ( things using algorithm ))) OR ( movement data algorithm ))', query time: 0.13s Refine Results
  1. 161

    Reinforced steering Evolutionary Markov Chain for high-dimensional feature selection by Atiq ur Rehman (3044409)

    Published 2024
    “…Although Evolutionary Algorithms (EAs) have shown promise in the literature for feature selection, creating EAs for high dimensions is still challenging. …”
  2. 162

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method by Amit Kumar Balyan (18288964)

    Published 2022
    “…Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …”
  3. 163
  4. 164

    Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform by Hamed Al-Shaibani (19497412)

    Published 2022
    “…Moreover, to ensure long-term unlinkability, the process of anonymization is repeated at regular time intervals (every trading session). …”
  5. 165
  6. 166

    Large-scale annotation dataset for fetal head biometry in ultrasound images by Mahmood Alzubaidi (15740693)

    Published 2023
    “…Its detailed annotations, broad compatibility, and ethical compliance make it a highly reusable and adaptable tool for the development of algorithms aimed at improving maternal and Fetal health.…”
  7. 167

    A Hybrid Approach for Predicting Critical Machining Conditions in Titanium Alloy Slot Milling Using Feature Selection and Binary Whale Optimization Algorithm by Amirsajjad Rahmani (17541453)

    Published 2023
    “…The t-test and the binary whale optimization algorithm (BWOA) were applied to choose the best features and train the support vector machine (SVM) model with validation and training data. …”
  8. 168

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura Habiba (17808302)

    Published 2023
    “…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. The performance evaluation using standard datasets demonstrates that the proposed model provides an accuracy of up to 99.99%.…”
  9. 169

    Multi Self-Organizing Map (SOM) Pipeline Architecture for Multi-View Clustering by Saadia Jamil (22045946)

    Published 2024
    “…A self-organizing map is one of the well-known unsupervised neural network algorithms used for preserving typologies during mapping from the input space (high-dimensional) to the display (low-dimensional).An algorithm called Local Adaptive Receptive Field Dimension Selective Self-Organizing Map 2 is a modified form of a self-organizing Map to cater different data types in the dataset. …”
  10. 170
  11. 171

    Edge Caching in Fog-Based Sensor Networks through Deep Learning-Associated Quantum Computing Framework by Tayyabah Hasan (18427887)

    Published 2022
    “…Firstly, the DL agent prioritizes caching contents via self organizing maps (SOMs) algorithm, and secondly, the prioritized contents are stored in QMM using a Two-Level Spin Quantum Phenomenon (TLSQP). …”
  12. 172

    Machine Learning Approach for the Design of an Assessment Outcomes Recommendation System by Abu Zitar, Raed

    Published 2021
    “…It is believed that the evaluation of the outcomes of the course, based on grades, is necessary to improve the teaching and learning process. Our research processes and workflows supported by AI utilize machine learning technology in order to interpret big data, analyze broad data sets and recognize associations with more reliably. …”
    Get full text
    Get full text
  13. 173
  14. 174

    Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE by Mathew, Elezabeth

    Published 2020
    “…The data analytics maturity model is used as the conceptual model for evaluating both data analytics and data governance in this research. …”
    Get full text
  15. 175

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. …”
  16. 176
  17. 177

    A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security by Shitharth Selvarajan (14157976)

    Published 2024
    “…In this case, the Rabin algorithm produces the digital signature needed to start the transaction. …”
  18. 178
  19. 179

    C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments by Raun, Kristo

    Published 2023
    “…The aim of streaming conformance checking is to find dis crepancies between process executions on streaming data and the refer ence process model. …”
    Get full text
    Get full text
    Get full text
  20. 180

    TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection by Zina Chkirbene (16869987)

    Published 2020
    “…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …”