يعرض 161 - 180 نتائج من 1,161 نتيجة بحث عن '(((( data using algorithm ) OR ( systems using algorithm ))) OR ( relevant data algorithm ))*', وقت الاستعلام: 0.21s تنقيح النتائج
  1. 161

    Using genetic algorithms to optimize software quality estimation models حسب Azar, Danielle

    منشور في 2004
    "…In the first approach, we assume the existence of several models, and we use a genetic algorithm to combine them, and adapt them to a given data set. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  2. 162
  3. 163
  4. 164
  5. 165

    RHEEMix in the data jungle: a cost-based optimizer for cross-platform systems. حسب Sebastian Kruse (18595195)

    منشور في 2020
    "…In this paper, we present the cost-based optimizer of Rheem, an open-source cross-platform system that copes with these new requirements. The optimizer allocates the subtasks of data analytic tasks to the most suitable platforms. …"
  6. 166

    An improved HIC using a new ordering and grouping algorithm حسب Bentrcia, A.

    منشور في 2003
    "…A linear group-wise successive interference canceller in a synchronous CDMA system is considered in this work. The proposed hybrid detector that combines successive and parallel cancellation techniques makes use of advantages offered by the two techniques. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 167
  8. 168

    An efficient approach for textual data classification using deep learning حسب Abdullah Alqahtani (7128143)

    منشور في 2022
    "…<p dir="ltr">Text categorization is an effective activity that can be accomplished using a variety of classification algorithms. In machine learning, the classifier is built by learning the features of categories from a set of preset training data. …"
  9. 169
  10. 170

    LDSVM: Leukemia Cancer Classification Using Machine Learning حسب Abdul Karim (417009)

    منشور في 2022
    "…This study proposes a novel method using machine learning algorithms based on microarrays of leukemia GSE9476 cells. …"
  11. 171

    Data Embedding in HEVC Video by Modifying the Partitioning of Coding Units حسب Shanableh, Tamer

    منشور في 2019
    "…The flags pertaining to 16x16 sub CUs are used as a cover for data embedding, where 6 or 4 message bits are embedded per CU. …"
    احصل على النص الكامل
    article
  12. 172
  13. 173
  14. 174

    Genetic Algorithm Control Strategy for Heat Pump System in Battery Electric Buses حسب Al Haddad, Rabih

    منشور في 2020
    "…This study proposes a genetic algorithm-based control strategy that optimizes the coefficient of performance of the HP system to decrease its energy consumption and maximize the driving range. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  15. 175

    An Effective Hybrid NARX-LSTM Model for Point and Interval PV Power Forecasting حسب Mohamed Massaoudi (16888710)

    منشور في 2021
    "…First, the NARXNN model acquires the data to generate a residual error vector. Then, the stacked LSTM model, optimized by Tabu search algorithm, uses the residual error correction associated with the original data to produce a point and interval PVPF. …"
  16. 176

    Implementation and Comparison of Particle Swarm Optimization and Genetic Algorithm Techniques in Combined Economic Emission Dispatch of an Independent Power Plant حسب Shahbaz Hussain (9765320)

    منشور في 2019
    "…The results are of great significance as the real data of an IPP is used and imply that the performance of PSO is better than that of GA in case of CEED for finding the optimal solution concerning fuel cost, emission, convergence characteristics, and computational time. …"
  17. 177
  18. 178

    Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey حسب Faria Nawshin (21841598)

    منشور في 2024
    "…As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. There are many machine-learning and deep-learning algorithms have been developed by researchers. …"
  19. 179
  20. 180