بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
element » elements (توسيع البحث)
يعرض 241 - 260 نتائج من 1,059 نتيجة بحث عن '(((( data using algorithm ) OR ( problem using algorithm ))) OR ( element network algorithm ))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 241

    Arabic Text Classification Using Modified Artificial Bee Colony Algorithm for Sentiment Analysis: The Case of Jordanian Dialect حسب Habeeb, Abdallah

    منشور في 2022
    "…The second phase, modified the Artificial Bee Colony (ABC) Algorithm, with Upper Confidence Bound (UCB) Algorithm, to promote the exploitation ability for the minimum dimension, to get the minimum number of the optimal feature, then using forward feature selection strategy by four classifiers of machine learning algorithms: (K-Nearest Neighbors (KNN), Support vector machines (SVM), Naïve-Bayes (NB), and Polynomial Neural Networks (PNN). …"
    احصل على النص الكامل
  2. 242

    Cyberbullying Detection in Arabic Text using Deep Learning حسب ALBAYARI, REEM RAMADAN SA’ID

    منشور في 2023
    "…Cyberbullying involves the use of communication technology and data, including messages, photographs, and videos, to undertake aggressive negative actions to harm others. …"
    احصل على النص الكامل
  3. 243
  4. 244
  5. 245

    On the parameterized parallel complexity and the vertex cover problem حسب Abu-Khzam, Faisal N.

    منشور في 2016
    "…We initiate the study of FPPT with the well-known k-vertex cover problem. In particular, we present a parallel algorithm that outperforms the best known parallel algorithm for this problem: using O(m) instead of O(n2) parallel processors, the running time improves from 4logn+O(kk) to O(k⋅log3n) , where m is the number of edges, n is the number of vertices of the input graph, and k is an upper bound of the size of the sought vertex cover. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  6. 246

    A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks حسب Umesh Kumar Lilhore (17727684)

    منشور في 2022
    "…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …"
  7. 247

    Data Generation for Path Testing حسب Mansour, Nashat

    منشور في 2004
    "…These algorithms are based on an optimization formulation of the path testing problem which include both integer- and real-value test cases. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 248
  9. 249

    Scheduling and allocation in high-level synthesis using stochastic techniques حسب Sait, Sadiq M.

    منشور في 2020
    "…Scheduling and allocation can be formulated as an optimization problem. In this work, a unique approach to scheduling and allocation problem using the genetic algorithm (GA) is described. …"
    احصل على النص الكامل
    article
  10. 250

    Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques حسب Ameema Zainab (16864263)

    منشور في 2020
    "…The obtained results illustrate the efficacy of the proposed algorithm to analyze the time series data from the IoT devices for spam detection.…"
  11. 251

    Stochastic optimal power flow framework with incorporation of wind turbines and solar PVs using improved liver cancer algorithm حسب Noor Habib Khan (22224775)

    منشور في 2024
    "…Moreover, ILCA is applied to resolve the stochastic renewable‐based (wind turbines + PVs) optimal power flow problem using a modified RER‐based IEEE 57‐bus. The objective of this work is to obtain the minimum predicted power losses and enhance the predicted voltage stability. …"
  12. 252
  13. 253

    Fuzzy genetic algorithm for floorplanning حسب Youssef, H.

    منشور في 2020
    "…Genetic algorithms (GAs) have been found to be very effective in solving numerous optimization problems, especially those with many (possibly) conflicting and noisy objectives. …"
    احصل على النص الكامل
    article
  14. 254

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method حسب Amit Kumar Balyan (18288964)

    منشور في 2022
    "…To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …"
  15. 255
  16. 256

    RFID localization using single reader antenna. (c2014) حسب Msheik, Hamze

    منشور في 2016
    "…Our scheme is based on Power Map Matching algorithm. The proposed method employs the use of a Single Stationary Reader Antenna and multitags placed on the asset. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  17. 257
  18. 258

    TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection حسب Zina Chkirbene (16869987)

    منشور في 2020
    "…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …"
  19. 259
  20. 260