بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
each algorithm » search algorithm (توسيع البحث), jaya algorithm (توسيع البحث)
trained using » brines using (توسيع البحث)
element » elements (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
each algorithm » search algorithm (توسيع البحث), jaya algorithm (توسيع البحث)
trained using » brines using (توسيع البحث)
element » elements (توسيع البحث)
-
81
Intelligent Bilateral Client Selection in Federated Learning Using Game Theory
منشور في 2022"…To overcome this problem, we present in this paper FedMint, an intelligent client selection approach for federated learning on IoT devices using game theory and bootstrapping mechanism. Our solution involves designing (1) preference functions for the client IoT devices and federated servers to allow them to rank each other according to several factors such as accuracy and price, (2) intelligent matching algorithms that take into account the preferences of both parties in their design, and (3) bootstrapping technique that capitalizes on the collaboration of multiple federated servers in order to assign initial accuracy value for the new connected IoT devices. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
82
A method for data path synthesis using neural networks
منشور في 2017احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
83
Indexing Arabic texts using association rule data mining
منشور في 2019"…The model denotes extracting new relevant words by relating those chosen by previous classical methods to new words using data mining rules. Design/methodology/approach The proposed model uses an association rule algorithm for extracting frequent sets containing related items – to extract relationships between words in the texts to be indexed with words from texts that belong to the same category. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
84
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
منشور في 2022"…The method used in this research is a classification of models and algorithms used in data mining. …"
احصل على النص الكامل
-
85
-
86
Sensitivity analysis and genetic algorithm-based shear capacity model for basalt FRC one-way slabs reinforced with BFRP bars
منشور في 2023"…A 3D finite element model was first developed and validated against available experimental results. …"
-
87
Data Embedding in HEVC Video by Modifying the Partitioning of Coding Units
منشور في 2019"…The flags pertaining to 16x16 sub CUs are used as a cover for data embedding, where 6 or 4 message bits are embedded per CU. …"
احصل على النص الكامل
article -
88
Auto-indexing Arabic texts based on association rule data mining. (c2015)
منشور في 2015"…Our model denotes extracting new relevant words by relating those chosen by the previous classical methods, to new words using data mining rules. The model uses the Apriori Algorithm - an association rule algorithm for extracting frequent sets containing related items - to extract relations between words in the texts to be indexed with words from texts that belong to the same category. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
89
Unsupervised Deep Learning for Classification Of Bats Calls Using Acoustic Data
منشور في 2021احصل على النص الكامل
doctoralThesis -
90
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
منشور في 2024"…As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. There are many machine-learning and deep-learning algorithms have been developed by researchers. …"
-
91
Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing
منشور في 2023"…This paper provides a comparative analysis of various metaheuristic load balancing algorithms for cloud computing based on performance factors i.e., Makespan time, degree of imbalance, response time, data center processing time, flow time, and resource utilization. …"
-
92
Customs Trade Facilitation and Compliance for Ecommerce using Blockchain and Data Mining
منشور في 2021"…Additionally, the Cross Industry Standard Process for Data Mining (CRISP-DM) methodology is employed for modelling the two proposed clustering algorithms to identify transactional risks. …"
احصل على النص الكامل
-
93
-
94
-
95
Forecasting the nearly unforecastable: why aren’t airline bookings adhering to the prediction algorithm?
منشور في 2021"…The resulting model achieves an 89% predictive accuracy using historical data. A unique aspect of the model is the incorporation of self-competence, where the model defers when it cannot reasonably make a recommendation. …"
-
96
Day-Ahead Load Demand Forecasting in Urban Community Cluster Microgrids Using Machine Learning Methods
منشور في 2022"…In addition, three distinct optimization techniques are used to find the optimum ANN training algorithm: Levenberg–Marquardt, Bayesian Regularization, and Scaled Conjugate Gradient. …"
-
97
Prediction of EV Charging Behavior Using Machine Learning
منشور في 2021"…Using data-driven tools and machine learning algorithms to learn the EV charging behavior can improve scheduling algorithms. …"
احصل على النص الكامل
article -
98
-
99
Exploring Sentiment Analysis using Different Machine Learning Algorithms on Dialectal Arabic
منشور في 2021"…Therefore, big data analytics field emerged to tame the generated big data, and use it to provide useful insights to the world. …"
احصل على النص الكامل
-
100
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
منشور في 2022"…There are a variety of ways in which AI technology can aid in the growth and profitability of a variety of industries. Such data can be parsed using ML and AI approaches in designed to check attacks on CPSs. …"
احصل على النص الكامل
احصل على النص الكامل