Showing 121 - 140 results of 669 for search '(((( develop ii algorithm ) OR ( element data algorithm ))) OR ( data modelling algorithm ))', query time: 0.15s Refine Results
  1. 121
  2. 122
  3. 123
  4. 124
  5. 125

    Social spider optimization algorithm: survey and new applications by Abualigah, Laith

    Published 2024
    “…This algorithm has been developed over time, resulting in many versions besides theories and findings. …”
    Get full text
  6. 126
  7. 127

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…The objective of this thesis is to propose a methodology to apply ensembling in the detection of infected hosts considering these two aspects. As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …”
    Get full text
  8. 128

    Data redundancy management for leaf-edges in connected environments by Mansour, Elio

    Published 2022
    “…Major advances in the fields of Internet and Communication Technology (ICT), data modeling/processing, and sensing technology have rendered traditional environments (e.g., cities, buildings) more connected. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  9. 129
  10. 130

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models by Osama Bassam J. Rabie (21323741)

    Published 2024
    “…For this purpose, a combination of Decisive Red Fox (DRF) Optimization and Descriptive Back Propagated Radial Basis Function (DBRF) classification are developed in the proposed work. The novelty of this work is, a recently developed DRF optimization methodology incorporated with the machine learning algorithm is utilized for maximizing the security level of IoT systems. …”
  11. 131

    Modelling Exchange Rates during Currency Crisis using Neural Networks by Nasr, G. E.

    Published 2006
    “…Exchange rate data from the Lebanese currency crisis period of 1985-1992 is used for training, testing and evaluation of the models. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  12. 132

    Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE by Mathew, Elezabeth

    Published 2020
    “…The data analytics maturity model is used as the conceptual model for evaluating both data analytics and data governance in this research. …”
    Get full text
  13. 133
  14. 134

    A method for data path synthesis using neural networks by Harmanani, H.

    Published 2017
    “…Presents a deterministic parallel algorithm to solve the data path allocation problem in high-level synthesis. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 135

    Indexing Arabic texts using association rule data mining by Haraty, Ramzi A.

    Published 2019
    “…Purpose The purpose of this paper is to propose a new model to enhance auto-indexing Arabic texts. The model denotes extracting new relevant words by relating those chosen by previous classical methods to new words using data mining rules. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  16. 136

    Eye-Clustering: An Enhanced Centroids Prediction for K-means Algorithm by Nasser, Youssef

    Published 2024
    “…To achieve this goal, supervised machine learning was employed to train models on graphs with labeled data points, where each graph contains a set of points and a label indicating the centroid determined by K-means. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  17. 137

    A Tabu Search Algorithm For Maintenance Scheduling Of Generating Units by El-Amin, I.

    Published 2020
    “…The algorithm was developed, implemented and tested on an integrated model for the MS problem. …”
    Get full text
    article
  18. 138

    A Tabu Search Algorithm For Maintenance Scheduling Of Generating Units by Duffuaa, S. O.

    Published 2020
    “…The algorithm was developed, implemented and tested on an integrated model for the MS problem. …”
    Get full text
    article
  19. 139

    Power Control Algorithms for Media Transmission in Remote Healthcare Systems by Ali Hassan Sodhro (18629392)

    Published 2018
    “…Thus, this paper first proposes a transmission power control (TPC)-based energy-efficient algorithm (EEA) for when a subject is in different postures, i.e., standing, walking, and running, in wireless body sensor networks. …”
  20. 140

    An efficient approach for textual data classification using deep learning by Abdullah Alqahtani (7128143)

    Published 2022
    “…<p dir="ltr">Text categorization is an effective activity that can be accomplished using a variety of classification algorithms. In machine learning, the classifier is built by learning the features of categories from a set of preset training data. …”