بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
element » elements (توسيع البحث)
يعرض 561 - 580 نتائج من 747 نتيجة بحث عن '(((( data processing algorithms ) OR ( data using algorithm ))) OR ( element method algorithm ))*', وقت الاستعلام: 0.15s تنقيح النتائج
  1. 561
  2. 562

    Benchmarking Concept Drift Detectors for Online Machine Learning حسب Mahgoub, Mahmoud

    منشور في 2022
    "…The main task is to detect changes in data distribution that might cause changes in the decision bound aries for a classification algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  3. 563

    Clustering Tweets to Discover Trending Topics about دبي (Dubai) حسب ALYALYALI, SALAMA KHAMIS SALEM KHAMIS

    منشور في 2018
    "…Then, creating a word vector to the tweets by using TF-IDF methodology. After this, log results into k- mean clustering algorithm with cosine similarity to measure similarity between objects of each cluster. …"
    احصل على النص الكامل
  4. 564

    A novel XML document structure comparison framework based-on sub-tree commonalities and label semantics حسب Tekli, Joe

    منشور في 2011
    "…XML similarity evaluation has become a central issue in the database and information communities, its applications ranging over document clustering, version control, data integration and ranked retrieval. Various algorithms for comparing hierarchically structured data, XML documents in particular, have been proposed in the literature. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 565

    The Impact of AI on Decision-Making in Educational Management: Benefits, Risks, and Ethical Concerns حسب JA’AROUN, WAED YOUSEF

    منشور في 2024
    "…The integration of artificial intelligence (AI) in educational management is rapidly transforming decision-making processes within schools and institutions. This dissertation explores the impact of AI on decision-making in educational management, focusing on the benefits, risks, and ethical concerns associated with its use. …"
    احصل على النص الكامل
  6. 566

    Decomposition-based wind power forecasting models and their boundary issue: An in-depth review and comprehensive discussion on potential solutions حسب Yinsong Chen (16685508)

    منشور في 2022
    "…However, existing studies usually utilize future data during the decomposition process and therefore cannot be appropriately employed for real-world applications, due to the inaccessibility of future data. …"
  7. 567

    A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security حسب Shitharth Selvarajan (14157976)

    منشور في 2024
    "…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …"
  8. 568

    AI-Based Methods for Predicting Required Insulin Doses for Diabetic Patients حسب Azar, Danielle

    منشور في 2015
    "…The performance of the three algorithms is evaluated on a data set found in the public UCMI repository.…"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 569
  10. 570

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura, Habiba

    منشور في 2023
    "…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 571

    A new estimator and approach for estimating the subpopulation parameters حسب Mohammad Salehi M. (21259490)

    منشور في 2021
    "…The criterion shows that the traditional total subpopulation estimator for unknown subpopulation size will be more efficient if the subpopulation mean is close to zero. Using an innovative procedure, we develop a new estimator, and we study its properties using real data. …"
  12. 572

    A systematic review of recent advances in the application of machine learning in membrane-based gas separation technologies حسب Farideh Abdollahi (22303153)

    منشور في 2024
    "…The fingerprinting and descriptors are two commonly approach for polymer featurization. In terms of algorithms, <u>neural networks</u> (NNs), random forest (RF), and gaussian process regression (GPR) are among the most extensively applied methods. …"
  13. 573

    Lagrangian tracking in stochastic fields with application to an ensemble of velocity fields in the Red Sea حسب Issa, Leila

    منشور في 2018
    "…Lagrangian tracking of passive tracers in a stochastic velocity field within a sequential ensemble data assimilation framework is challenging due to the exponential growth in the number of particles. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 574

    Uplink Noma in UAV-Assisted IoT Networks حسب Mrad, Ali

    منشور في 2022
    "…The second device is then selected using a heuristic algorithm based on prioritizing devices with higher bit rate requirements and strict deadlines. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  15. 575

    Starvation Problem in CPU Scheduling for Multimedia Systems حسب Salah, Khaled

    منشور في 2002
    "…Multimedia applications have timing requirements that cannot generally be satisfied using the time-sharing algorithms of general-purpose operating systems. …"
    احصل على النص الكامل
    article
  16. 576
  17. 577

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura Habiba (17808302)

    منشور في 2023
    "…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
  18. 578

    NEURAL NETWORK MODEL FOR PLANNED REPLACEMENT OF BOEING 737 BRAKES حسب Al-Garni, Ahmed Z.

    منشور في 2020
    "…Three years of data are used for model building and validation. …"
    احصل على النص الكامل
    article
  19. 579

    Anonymizing multimedia documents حسب Haraty, Ramzi

    منشور في 2016
    "…In this paper, we propose de-linkability, a privacy-preserving constraint to bound the amount of information outsourced that can be used to re-identify individuals. We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 580