بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
using algorithms » cosine algorithm (توسيع البحث)
يعرض 181 - 200 نتائج من 765 نتيجة بحث عن '(((( data using algorithms ) OR ( data processing algorithm ))) OR ( present within algorithm ))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 181

    Detecting sleep outside the clinic using wearable heart rate devices حسب Ignacio Perez-Pozuelo (14153007)

    منشور في 2022
    "…Personalized yet device-agnostic algorithms can sidestep laborious human annotations and objectify cross-cohort comparisons. …"
  2. 182

    Cyberbullying Detection Model for Arabic Text Using Deep Learning حسب Albayari, Reem

    منشور في 2023
    "…Hence, detecting any act of cyberbullying in an automated manner will be helpful for stakeholders to prevent any unfortunate results from the victim’s perspective. Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …"
    احصل على النص الكامل
    احصل على النص الكامل
  3. 183

    Portfolio Selection Problem Using CVaR Risk Measures Equipped with DEA, PSO, and ICA Algorithms حسب Abdelouahed Hamdi (14158899)

    منشور في 2022
    "…There are different metrics for the calculation of the risk factor, among which the most important one is the Conditional Value at Risk (CVaR). On the other hand, Data Envelopment Analysis (DEA) can be used to form the optimal portfolio and evaluate its efficiency. …"
  4. 184

    Energy utilization assessment of a semi-closed greenhouse using data-driven model predictive control حسب Farhat Mahmood (15468854)

    منشور في 2021
    "…The proposed method consists of a multilayer perceptron model representing the greenhouse system integrated with an objective function and an optimization algorithm. The multilayer perceptron model is trained using historical data from the greenhouse with solar radiation, outside temperature, humidity difference, fan speed, HVAC control as the input parameters to predict the temperature. …"
  5. 185

    Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE حسب Mathew, Elezabeth

    منشور في 2020
    "…The data analytics maturity model is used as the conceptual model for evaluating both data analytics and data governance in this research. …"
    احصل على النص الكامل
  6. 186
  7. 187
  8. 188
  9. 189

    Predicting Plasma Vitamin C Using Machine Learning حسب Daniel Kirk (17302798)

    منشور في 2022
    "…The objective of this study is to predict plasma vitamin C using machine learning. The NHANES dataset was used to predict plasma vitamin C in a cohort of 2952 American adults using regression algorithms and clustering in a way that a hypothetical health application might. …"
  10. 190
  11. 191
  12. 192
  13. 193
  14. 194

    Multi-Cluster Jumping Particle Swarm Optimization for Fast Convergence حسب Atiq Ur Rehman (8843024)

    منشور في 2020
    "…Keeping in view the need of an optimization algorithm with fast convergence speed, suitable for high dimensional data space, this article proposes a novel concept of Multi-Cluster Jumping PSO. …"
  15. 195

    Android Malware Detection Using Machine Learning حسب Al Ali, Shaikha

    منشور في 2024
    "…Detecting and preventing malware is crucial for several reasons, including the security of personal information, data loss and tampering, system disruptions, financial losses, and reputation damage. …"
    احصل على النص الكامل
    article
  16. 196
  17. 197

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment حسب Zakaria Tolba (16904718)

    منشور في 2022
    "…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …"
  18. 198
  19. 199
  20. 200