Search alternatives:
using algorithm » cosine algorithm (Expand Search)
event based » agent based (Expand Search)
Showing 1 - 20 results of 720 for search '(((( data using algorithm ) OR ( things using algorithm ))) OR ( event based algorithm ))*', query time: 0.14s Refine Results
  1. 1
  2. 2

    Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT by Arumugam K (18456690)

    Published 2021
    “…This paper proposes an Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT. …”
  3. 3

    Efficient Approximate Conformance Checking Using Trie Data Structures by Awad, Ahmed

    Published 2021
    “…By encoding the proxy behavior using a trie data structure, we obtain a logarithmically reduced search space for alignment computation compared to a set-based representation. …”
    Get full text
    Get full text
    Get full text
  4. 4
  5. 5

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems by Almajed, Rasha

    Published 2022
    “…There are a variety of ways in which AI technology can aid in the growth and profitability of a variety of industries. Such data can be parsed using ML and AI approaches in designed to check attacks on CPSs. …”
    Get full text
    Get full text
  6. 6

    Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation by Fawaz Kserawi (16904859)

    Published 2022
    “…We describe our differentially-private model with flexible constraints and a dynamic window algorithm to maintain the privacy-budget loss in infinitely generated time-series data. …”
  7. 7

    Extreme Early Image Recognition Using Event-Based Vision by Abubakar Abubakar (18278998)

    Published 2023
    “…In this paper, we propose an innovative image recognition technique that operates on image events rather than frame-based data, paving the way for a new paradigm of recognizing objects prior to image acquisition. …”
  8. 8

    A Novel Big Data Classification Technique for Healthcare Application Using Support Vector Machine, Random Forest and J48 by Al-Manaseer, Hitham

    Published 2022
    “…In this study, the possibility of using and applying the capabilities of artificial intelligence (AI) and machine learning (ML) to increase the effectiveness of Internet of Things (IoT) and big data in developing a system that supports decision makers in the medical fields was studied. …”
    Get full text
  9. 9

    I Will Survive: An Event-driven Conformance Checking Approach Over Process Streams by Raun, Kristo

    Published 2023
    “…This paper introduces a new approximate algorithm – I Will Survive (IWS). The algorithm utilizes the trie data structure to improve the calculation speed, while remaining memory-efficient. …”
    Get full text
    Get full text
    Get full text
  10. 10

    Cryptocurrency Exchange Market Prediction and Analysis Using Data Mining and Artificial Intelligence by Al Rayhi, Nasser

    Published 2020
    “…One of the best algorithms in terms of the result is the Long Short Term Memory (LSTM) since it is based on recurrent neural networks which uses loop as a method to learn from heuristics data. …”
    Get full text
  11. 11

    QU-GM: An IoT Based Glucose Monitoring System From Photoplethysmography, Blood Pressure, and Demographic Data Using Machine Learning by Md Nazmul Islam Shuzan (21842426)

    Published 2024
    “…We collected PPG signals, demographic information, and blood pressure data from 139 diabetic (49.65%) and non-diabetic (50.35%) subjects. …”
  12. 12

    Delay Optimization in LoRaWAN by Employing Adaptive Scheduling Algorithm With Unsupervised Learning by Zulfiqar Ali (117651)

    Published 2023
    “…This paper aims to optimize the delay in LoRaWAN by using an Adaptive Scheduling Algorithm (ASA) with an unsupervised probabilistic approach called Gaussian Mixture Model (GMM). …”
  13. 13

    Intelligent Bilateral Client Selection in Federated Learning Using Game Theory by Wehbi, Osama

    Published 2022
    “…To overcome this problem, we present in this paper FedMint, an intelligent client selection approach for federated learning on IoT devices using game theory and bootstrapping mechanism. Our solution involves designing (1) preference functions for the client IoT devices and federated servers to allow them to rank each other according to several factors such as accuracy and price, (2) intelligent matching algorithms that take into account the preferences of both parties in their design, and (3) bootstrapping technique that capitalizes on the collaboration of multiple federated servers in order to assign initial accuracy value for the new connected IoT devices. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  14. 14

    Allocation and re-allocation of data in a grid using an adaptive genetic algorithm by Mansour, N.

    Published 2006
    “…Allocation and re-allocation of data in a grid using an adaptive genetic algorithm. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 15

    Android Malware Detection Using Machine Learning by Al Ali, Shaikha

    Published 2024
    “…Detecting and preventing malware is crucial for several reasons, including the security of personal information, data loss and tampering, system disruptions, financial losses, and reputation damage. …”
    Get full text
    article
  16. 16
  17. 17

    Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm by Abu Zitar, Raed

    Published 2022
    “…Moreover, the image pixels in different and more similar areas of the image are located next to one another in a group and classified using the specified thresholds. As a result, the embedding capacity in each class can increase by reducing the value of the difference between two consecutive pixels, and the distortion of the marked image can decrease after inserting the personal data using the DE method. …”
    Get full text
  18. 18
  19. 19

    Using Machine Learning Algorithms to Forecast Solar Energy Power Output by Ali Jassim Lari (22597940)

    Published 2025
    “…We focused on the first 30-min, 3-h, 6-h, 12-h, and 24-h windows to gain an appreciation of the impact of forecasting duration on the accuracy of prediction using the selected machine learning algorithms. The study results show that Random Forest outperformed all other tested algorithms. …”
  20. 20

    Limiting the Collection of Ground Truth Data for Land Use and Land Cover Maps with Machine Learning Algorithms by Usman Ali (6586886)

    Published 2022
    “…This was accomplished by (1) extracting reliable LULC information from Sentinel-2 and Landsat-8 s images, (2) generating remote sensing indices used to train ML algorithms, and (3) comparing the results with ground truth data. …”