بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
two algorithms » _ algorithms (توسيع البحث)
develop » developed (توسيع البحث)
يعرض 141 - 160 نتائج من 901 نتيجة بحث عن '(((( develop two algorithms ) OR ( elements network algorithm ))) OR ( data using algorithm ))', وقت الاستعلام: 0.20s تنقيح النتائج
  1. 141
  2. 142

    Enhancing Breast Cancer Diagnosis With Bidirectional Recurrent Neural Networks: A Novel Approach for Histopathological Image Multi-Classification حسب Rajendra Babu Chikkala (22330876)

    منشور في 2025
    "…In this study, we introduce an innovative method for the multi-classification of breast cancer histopathological images utilizing Bidirectional Recurrent Neural Networks (BRNN). The BRNN structure consists of four unique elements: the backbone branch for transfer learning, the Gated Recurrent Unit (GRU), the residual collaborative branch, and the feature fusion module. …"
  3. 143

    A Novel Big Data Classification Technique for Healthcare Application Using Support Vector Machine, Random Forest and J48 حسب Al-Manaseer, Hitham

    منشور في 2022
    "…The performance of the algorithms for accuracy was evaluated using the Healthcare (heart attack possibility) dataset, freely available on kagle. …"
    احصل على النص الكامل
  4. 144

    A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems حسب Faria Nawshin (21841598)

    منشور في 2025
    "…<p dir="ltr">Federated Learning (FL) is gaining traction in Android-based consumer electronics, enabling collaborative model training across decentralized devices while preserving data privacy. However, the increasing adoption of FL in these devices exposes them to adversarial attacks that can compromise user data and device security. …"
  5. 145

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts حسب ALSHAMSI, SUROUR

    منشور في 2022
    "…The objective of this thesis is to propose a methodology to apply ensembling in the detection of infected hosts considering these two aspects. As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …"
    احصل على النص الكامل
  6. 146

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method حسب Shahid Rahman (16904613)

    منشور في 2022
    "…<p>Communication has become a lot easier in this era of technology, development of high-speed computer networks, and the inexpensive uses of Internet. …"
  7. 147

    Predicting Plasma Vitamin C Using Machine Learning حسب Daniel Kirk (17302798)

    منشور في 2022
    "…The objective of this study is to predict plasma vitamin C using machine learning. The NHANES dataset was used to predict plasma vitamin C in a cohort of 2952 American adults using regression algorithms and clustering in a way that a hypothetical health application might. …"
  8. 148

    Stochastic Search Algorithms for Exam Scheduling حسب Mansour, Nashat

    منشور في 2007
    "…Then, we empirically compare the three proposed algorithms and FESP using realistic data. Our experimental results show that SA and GA produce good exam schedules that are better than those of FESP heuristic procedure. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 149
  10. 150

    Robust Control Of Sampled Data Systems حسب AL-Sunni, Fouad

    منشور في 2020
    "…They then present a numerical controller design algorithm based on the derived bounds. Examples are used for demonstration.…"
    احصل على النص الكامل
    article
  11. 151

    Robust Control Of Sampled Data Systems حسب AL-Sunni, Fouad

    منشور في 2020
    "…They then present a numerical controller design algorithm based on the derived bounds. Examples are used for demonstration.…"
    احصل على النص الكامل
    article
  12. 152

    Robust Control Of Sampled Data Systems حسب AL-Sunni, Fouad

    منشور في 2020
    "…They then present a numerical controller design algorithm based on the derived bounds.Examples are used for demonstration.…"
    احصل على النص الكامل
    article
  13. 153

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches حسب Natasha Akram (20749538)

    منشور في 2024
    "…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …"
  14. 154

    Oversampling techniques for imbalanced data in regression حسب Samir Brahim Belhaouari (9427347)

    منشور في 2024
    "…For tabular data we conducted a comprehensive experiment using various models trained on both augmented and non-augmented datasets, followed by performance comparisons on test data. …"
  15. 155
  16. 156
  17. 157
  18. 158

    Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval حسب Mohammed Tahar Habib Kaib (21633176)

    منشور في 2024
    "…<p dir="ltr">Fault detection and diagnosis (FDD) systems play a crucial role in maintaining the adequate execution of the monitored process. One of the widely used data-driven FDD methods is the Principal Component Analysis (PCA). …"
  19. 159

    Multi-Cluster Jumping Particle Swarm Optimization for Fast Convergence حسب Atiq Ur Rehman (8843024)

    منشور في 2020
    "…Keeping in view the need of an optimization algorithm with fast convergence speed, suitable for high dimensional data space, this article proposes a novel concept of Multi-Cluster Jumping PSO. …"
  20. 160

    Performance of artificial intelligence models in estimating blood glucose level among diabetic patients using non-invasive wearable device data حسب Arfan Ahmed (17541309)

    منشور في 2023
    "…One of the key aspects of WDs with machine learning (ML) algorithms is to find specific data signatures, called Digital biomarkers, that can be used in classification or gaging the extent of the underlying condition. …"