بدائل البحث:
lacking algorithm » learning algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
element based » event based (توسيع البحث)
يعرض 81 - 100 نتائج من 739 نتيجة بحث عن '(((( data using algorithm ) OR ( data lacking algorithm ))) OR ( element based algorithm ))', وقت الاستعلام: 0.15s تنقيح النتائج
  1. 81

    Predictive Model of Psychoactive Drugs Consumption using Classification Machine Learning Algorithms حسب Almahmood, Mothanna

    منشور في 2023
    "…Our study aimed to use data mining classification techniques, in order to classify the individual into two categories: user or non-user. …"
    احصل على النص الكامل
  2. 82

    The Relation Between Respiratory & Acute Coronary Syndrome Using Data Mining Techniques حسب DOULEH, HANI ABDULLAH YOSEF ABU

    منشور في 2018
    "…The purpose of this study is to diagnose acute coronary syndrome using the widely available respiratory diagnosing tools and laboratory test results using data mining classification techniques (Decision tree, Gradient boosted tree, Neural Network, and Naïve Bias). …"
    احصل على النص الكامل
  3. 83

    Sentiment analysis for Arabizi in social media. (c2015) حسب Tobaili, Taha

    منشور في 2015
    "…We took the initiative to make use of this abundance of data by analyzing it and predicting sentiment. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  4. 84

    Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm حسب Saima Hassan (14918003)

    منشور في 2022
    "…The antecedent part parameters (Gaussian membership function parameters) are encoded as a population of artificial swarm of grasshoppers and optimized using its algorithm. Tuning of the consequent part parameters are accomplished using extreme learning machine. …"
  5. 85
  6. 86

    Practical single node failure recovery using fractional repetition codes in data centers حسب Itani, May

    منشور في 2016
    "…Hence, a practical solution for node failures is presented by using a self-designed genetic algorithm that searches within the feasible solution space. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  7. 87
  8. 88

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group حسب Iqtadar Hussain (14147850)

    منشور في 2023
    "…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …"
  9. 89
  10. 90
  11. 91
  12. 92

    The automation of the development of classification models and improvement of model quality using feature engineering techniques حسب Sjoerd Boeschoten (17347045)

    منشور في 2023
    "…We demonstrated the applicability of feature engineering techniques such as data imputation, transformation (e.g., scaling, centering, etc.), and data balancing using several case studies and the proposed semi-automated framework. …"
  13. 93
  14. 94
  15. 95

    Detecting sleep outside the clinic using wearable heart rate devices حسب Ignacio Perez-Pozuelo (14153007)

    منشور في 2022
    "…Personalized yet device-agnostic algorithms can sidestep laborious human annotations and objectify cross-cohort comparisons. …"
  16. 96

    Scalable Nonparametric Supervised Learning for Streaming and Massive Data: Applications in Healthcare Monitoring and Credit Risk حسب Mohamed Chaouch (17983846)

    منشور في 2025
    "…Additionally, an online classifier is developed for streaming data, combining online PCA with a kernel-based recursive classifier using a stochastic approximation algorithm. …"
  17. 97
  18. 98
  19. 99

    Portfolio Selection Problem Using CVaR Risk Measures Equipped with DEA, PSO, and ICA Algorithms حسب Abdelouahed Hamdi (14158899)

    منشور في 2022
    "…There are different metrics for the calculation of the risk factor, among which the most important one is the Conditional Value at Risk (CVaR). On the other hand, Data Envelopment Analysis (DEA) can be used to form the optimal portfolio and evaluate its efficiency. …"
  20. 100

    Energy utilization assessment of a semi-closed greenhouse using data-driven model predictive control حسب Farhat Mahmood (15468854)

    منشور في 2021
    "…The proposed method consists of a multilayer perceptron model representing the greenhouse system integrated with an objective function and an optimization algorithm. The multilayer perceptron model is trained using historical data from the greenhouse with solar radiation, outside temperature, humidity difference, fan speed, HVAC control as the input parameters to predict the temperature. …"