Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithms » cosine algorithm (Expand Search)
Showing 181 - 200 results of 716 for search '(((( data using algorithms ) OR ( data processing algorithm ))) OR ( elements mapping algorithm ))', query time: 0.15s Refine Results
  1. 181

    Detecting sleep outside the clinic using wearable heart rate devices by Ignacio Perez-Pozuelo (14153007)

    Published 2022
    “…Personalized yet device-agnostic algorithms can sidestep laborious human annotations and objectify cross-cohort comparisons. …”
  2. 182

    Cyberbullying Detection Model for Arabic Text Using Deep Learning by Albayari, Reem

    Published 2023
    “…Hence, detecting any act of cyberbullying in an automated manner will be helpful for stakeholders to prevent any unfortunate results from the victim’s perspective. Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …”
    Get full text
    Get full text
  3. 183

    Portfolio Selection Problem Using CVaR Risk Measures Equipped with DEA, PSO, and ICA Algorithms by Abdelouahed Hamdi (14158899)

    Published 2022
    “…There are different metrics for the calculation of the risk factor, among which the most important one is the Conditional Value at Risk (CVaR). On the other hand, Data Envelopment Analysis (DEA) can be used to form the optimal portfolio and evaluate its efficiency. …”
  4. 184

    Energy utilization assessment of a semi-closed greenhouse using data-driven model predictive control by Farhat Mahmood (15468854)

    Published 2021
    “…The proposed method consists of a multilayer perceptron model representing the greenhouse system integrated with an objective function and an optimization algorithm. The multilayer perceptron model is trained using historical data from the greenhouse with solar radiation, outside temperature, humidity difference, fan speed, HVAC control as the input parameters to predict the temperature. …”
  5. 185

    Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE by Mathew, Elezabeth

    Published 2020
    “…The data analytics maturity model is used as the conceptual model for evaluating both data analytics and data governance in this research. …”
    Get full text
  6. 186
  7. 187
  8. 188
  9. 189

    Predicting Plasma Vitamin C Using Machine Learning by Daniel Kirk (17302798)

    Published 2022
    “…The objective of this study is to predict plasma vitamin C using machine learning. The NHANES dataset was used to predict plasma vitamin C in a cohort of 2952 American adults using regression algorithms and clustering in a way that a hypothetical health application might. …”
  10. 190
  11. 191
  12. 192
  13. 193
  14. 194

    Multi-Cluster Jumping Particle Swarm Optimization for Fast Convergence by Atiq Ur Rehman (8843024)

    Published 2020
    “…Keeping in view the need of an optimization algorithm with fast convergence speed, suitable for high dimensional data space, this article proposes a novel concept of Multi-Cluster Jumping PSO. …”
  15. 195

    Android Malware Detection Using Machine Learning by Al Ali, Shaikha

    Published 2024
    “…Detecting and preventing malware is crucial for several reasons, including the security of personal information, data loss and tampering, system disruptions, financial losses, and reputation damage. …”
    Get full text
    article
  16. 196
  17. 197

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment by Zakaria Tolba (16904718)

    Published 2022
    “…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
  18. 198
  19. 199

    Use data Mining Techniques to Predict Users’ Engagement on the Social Network Posts in The Period Before, During and After Ramadan by AL RAWASHDEH, HANEEN MOHAMMAD

    Published 2017
    “…Different classification algorithms were applied to the dataset using the Rapidminer tool. …”
    Get full text
  20. 200