يعرض 81 - 100 نتائج من 750 نتيجة بحث عن '(((( data using algorithm ) OR ( trained using algorithm ))) OR ( element each algorithm ))', وقت الاستعلام: 0.14s تنقيح النتائج
  1. 81

    Intelligent Bilateral Client Selection in Federated Learning Using Game Theory حسب Wehbi, Osama

    منشور في 2022
    "…To overcome this problem, we present in this paper FedMint, an intelligent client selection approach for federated learning on IoT devices using game theory and bootstrapping mechanism. Our solution involves designing (1) preference functions for the client IoT devices and federated servers to allow them to rank each other according to several factors such as accuracy and price, (2) intelligent matching algorithms that take into account the preferences of both parties in their design, and (3) bootstrapping technique that capitalizes on the collaboration of multiple federated servers in order to assign initial accuracy value for the new connected IoT devices. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  2. 82
  3. 83

    Indexing Arabic texts using association rule data mining حسب Haraty, Ramzi A.

    منشور في 2019
    "…The model denotes extracting new relevant words by relating those chosen by previous classical methods to new words using data mining rules. Design/methodology/approach The proposed model uses an association rule algorithm for extracting frequent sets containing related items – to extract relationships between words in the texts to be indexed with words from texts that belong to the same category. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 84

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector حسب AL HAMMADI, SUMAYYA ABDULLA

    منشور في 2022
    "…The method used in this research is a classification of models and algorithms used in data mining. …"
    احصل على النص الكامل
  5. 85
  6. 86

    Sensitivity analysis and genetic algorithm-based shear capacity model for basalt FRC one-way slabs reinforced with BFRP bars حسب Abathar Al-Hamrani (16494884)

    منشور في 2023
    "…A 3D finite element model was first developed and validated against available experimental results. …"
  7. 87

    Data Embedding in HEVC Video by Modifying the Partitioning of Coding Units حسب Shanableh, Tamer

    منشور في 2019
    "…The flags pertaining to 16x16 sub CUs are used as a cover for data embedding, where 6 or 4 message bits are embedded per CU. …"
    احصل على النص الكامل
    article
  8. 88

    Auto-indexing Arabic texts based on association rule data mining. (c2015) حسب Rouba G. Nasrallah

    منشور في 2015
    "…Our model denotes extracting new relevant words by relating those chosen by the previous classical methods, to new words using data mining rules. The model uses the Apriori Algorithm - an association rule algorithm for extracting frequent sets containing related items - to extract relations between words in the texts to be indexed with words from texts that belong to the same category. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  9. 89
  10. 90

    Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey حسب Faria Nawshin (21841598)

    منشور في 2024
    "…As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. There are many machine-learning and deep-learning algorithms have been developed by researchers. …"
  11. 91

    Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing حسب Jincheng Zhou (1887307)

    منشور في 2023
    "…This paper provides a comparative analysis of various metaheuristic load balancing algorithms for cloud computing based on performance factors i.e., Makespan time, degree of imbalance, response time, data center processing time, flow time, and resource utilization. …"
  12. 92

    Customs Trade Facilitation and Compliance for Ecommerce using Blockchain and Data Mining حسب Alqaryouti, Omar

    منشور في 2021
    "…Additionally, the Cross Industry Standard Process for Data Mining (CRISP-DM) methodology is employed for modelling the two proposed clustering algorithms to identify transactional risks. …"
    احصل على النص الكامل
  13. 93
  14. 94
  15. 95

    Forecasting the nearly unforecastable: why aren’t airline bookings adhering to the prediction algorithm? حسب Saravanan Thirumuruganathan (11038038)

    منشور في 2021
    "…The resulting model achieves an 89% predictive accuracy using historical data. A unique aspect of the model is the incorporation of self-competence, where the model defers when it cannot reasonably make a recommendation. …"
  16. 96

    Day-Ahead Load Demand Forecasting in Urban Community Cluster Microgrids Using Machine Learning Methods حسب Sivakavi Naga Venkata Bramareswara Rao (15944992)

    منشور في 2022
    "…In addition, three distinct optimization techniques are used to find the optimum ANN training algorithm: Levenberg–Marquardt, Bayesian Regularization, and Scaled Conjugate Gradient. …"
  17. 97

    Prediction of EV Charging Behavior Using Machine Learning حسب Shahriar, Sakib

    منشور في 2021
    "…Using data-driven tools and machine learning algorithms to learn the EV charging behavior can improve scheduling algorithms. …"
    احصل على النص الكامل
    article
  18. 98
  19. 99

    Exploring Sentiment Analysis using Different Machine Learning Algorithms on Dialectal Arabic حسب AL MANSOORI, MOUZA

    منشور في 2021
    "…Therefore, big data analytics field emerged to tame the generated big data, and use it to provide useful insights to the world. …"
    احصل على النص الكامل
  20. 100

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems حسب Almajed, Rasha

    منشور في 2022
    "…There are a variety of ways in which AI technology can aid in the growth and profitability of a variety of industries. Such data can be parsed using ML and AI approaches in designed to check attacks on CPSs. …"
    احصل على النص الكامل
    احصل على النص الكامل