Search alternatives:
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
element » elements (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
element » elements (Expand Search)
-
101
Data Embedding in HEVC Video by Modifying the Partitioning of Coding Units
Published 2019“…The flags pertaining to 16x16 sub CUs are used as a cover for data embedding, where 6 or 4 message bits are embedded per CU. …”
Get full text
article -
102
Unsupervised Deep Learning for Classification Of Bats Calls Using Acoustic Data
Published 2021Get full text
doctoralThesis -
103
Auto-indexing Arabic texts based on association rule data mining. (c2015)
Published 2015“…Our model denotes extracting new relevant words by relating those chosen by the previous classical methods, to new words using data mining rules. The model uses the Apriori Algorithm - an association rule algorithm for extracting frequent sets containing related items - to extract relations between words in the texts to be indexed with words from texts that belong to the same category. …”
Get full text
Get full text
masterThesis -
104
The use of multi-task learning in cybersecurity applications: a systematic literature review
Published 2024“…Therefore, we carried out a systematic literature review (SLR) on the use of MTL in cybersecurity applications and explored its potential applications and effectiveness in developing security measures. …”
-
105
Customs Trade Facilitation and Compliance for Ecommerce using Blockchain and Data Mining
Published 2021“…Additionally, the Cross Industry Standard Process for Data Mining (CRISP-DM) methodology is employed for modelling the two proposed clustering algorithms to identify transactional risks. …”
Get full text
-
106
Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing
Published 2023“…This paper provides a comparative analysis of various metaheuristic load balancing algorithms for cloud computing based on performance factors i.e., Makespan time, degree of imbalance, response time, data center processing time, flow time, and resource utilization. …”
-
107
An Effective Hash Based Assessment and Recovery Algorithm for Healthcare Systems
Published 2019Get full text
Get full text
Get full text
masterThesis -
108
Forecasting the nearly unforecastable: why aren’t airline bookings adhering to the prediction algorithm?
Published 2021“…The resulting model achieves an 89% predictive accuracy using historical data. A unique aspect of the model is the incorporation of self-competence, where the model defers when it cannot reasonably make a recommendation. …”
-
109
Prediction of EV Charging Behavior Using Machine Learning
Published 2021“…Using data-driven tools and machine learning algorithms to learn the EV charging behavior can improve scheduling algorithms. …”
Get full text
article -
110
-
111
Scalable parallel algorithms for dynamic programming on tree decomposition. (c2017)
Published 2017Get full text
Get full text
Get full text
masterThesis -
112
Salp swarm algorithm: survey, analysis, and new applications
Published 2024“…In this paper, the most important literature and previous studies related to the subject of the study were presented, where nearly 30 researches were referred to develop a theoretical framework related to SSA and other improved algorithms and to compare SSA with other systems. …”
Get full text
-
113
Exploring Sentiment Analysis using Different Machine Learning Algorithms on Dialectal Arabic
Published 2021“…Therefore, big data analytics field emerged to tame the generated big data, and use it to provide useful insights to the world. …”
Get full text
-
114
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…There are a variety of ways in which AI technology can aid in the growth and profitability of a variety of industries. Such data can be parsed using ML and AI approaches in designed to check attacks on CPSs. …”
Get full text
Get full text
-
115
Predictive Model of Psychoactive Drugs Consumption using Classification Machine Learning Algorithms
Published 2023“…Our study aimed to use data mining classification techniques, in order to classify the individual into two categories: user or non-user. …”
Get full text
-
116
Data-Driven Electricity Demand Modeling for Electric Vehicles Using Machine Learning
Published 2024Get full text
doctoralThesis -
117
Chlorophyll-a concentrations in the Arabian Gulf waters of arid region: A case study from the northern coast of Qatar
Published 2022“…The performance of the algorithms was studied using WorldView-3 data, which provided the R2 values of 60% and the best suitability of the NDCI algorithm and MSI data to map the concentration of Chl-a. …”
Get full text
Get full text
Get full text
article -
118
Methods for system-on-chip test design, scheduling and optimization. (c2006)
Published 2006Get full text
Get full text
masterThesis -
119
The Relation Between Respiratory & Acute Coronary Syndrome Using Data Mining Techniques
Published 2018“…The purpose of this study is to diagnose acute coronary syndrome using the widely available respiratory diagnosing tools and laboratory test results using data mining classification techniques (Decision tree, Gradient boosted tree, Neural Network, and Naïve Bias). …”
Get full text
-
120
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
Published 2022“…<p>Communication has become a lot easier in this era of technology, development of high-speed computer networks, and the inexpensive uses of Internet. …”