Search alternatives:
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
-
101
Wind, Solar, and Photovoltaic Renewable Energy Systems with and without Energy Storage Optimization: A Survey of Advanced Machine Learning and Deep Learning Techniques
Published 2022“…This paper covered the most resent and important researchers in the domain of renewable problems using the learning-based methods. Various types of Deep Learning (DL) and Machine Learning (ML) algorithms employed in Solar and Wind energy supplies are given. …”
Get full text
-
102
An efficient approach for textual data classification using deep learning
Published 2022“…<p dir="ltr">Text categorization is an effective activity that can be accomplished using a variety of classification algorithms. In machine learning, the classifier is built by learning the features of categories from a set of preset training data. …”
-
103
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…The method used in this research is a classification of models and algorithms used in data mining. …”
Get full text
-
104
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
Published 2022“…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
-
105
A Graph Heuristic Approach for the Data Path Allocation Problem
Published 2022Get full text
Get full text
Get full text
masterThesis -
106
Exploring the Impact of Explainable Artificial Intelligence on Decision-making in Healthcare
Published 2023“…As artificial intelligence (AI) advances in healthcare, there is an increasing need to understand how AI-driven decision-making affects healthcare workers and patients. The development of explainable artificial intelligence (XAI) systems, which attempt to give visible and interpretable explanations for AI algorithms' judgements, is a vital part of AI in healthcare. …”
Get full text
-
107
Data Embedding in HEVC Video by Modifying the Partitioning of Coding Units
Published 2019“…The flags pertaining to 16x16 sub CUs are used as a cover for data embedding, where 6 or 4 message bits are embedded per CU. …”
Get full text
article -
108
Unsupervised Deep Learning for Classification Of Bats Calls Using Acoustic Data
Published 2021Get full text
doctoralThesis -
109
The use of multi-task learning in cybersecurity applications: a systematic literature review
Published 2024“…Therefore, we carried out a systematic literature review (SLR) on the use of MTL in cybersecurity applications and explored its potential applications and effectiveness in developing security measures. …”
-
110
Customs Trade Facilitation and Compliance for Ecommerce using Blockchain and Data Mining
Published 2021“…Additionally, the Cross Industry Standard Process for Data Mining (CRISP-DM) methodology is employed for modelling the two proposed clustering algorithms to identify transactional risks. …”
Get full text
-
111
Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing
Published 2023“…This paper provides a comparative analysis of various metaheuristic load balancing algorithms for cloud computing based on performance factors i.e., Makespan time, degree of imbalance, response time, data center processing time, flow time, and resource utilization. …”
-
112
Random Forest Bagging and X‐Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data
Published 2021“…<p dir="ltr">In the current ongoing crisis, people mostly rely on mobile phones for all the activities, but query analysis and mobile data security are major issues. Several research works have been made on efficient detection of antipatterns for minimizing the complexity of query analysis. …”
-
113
An Effective Hash Based Assessment and Recovery Algorithm for Healthcare Systems
Published 2019Get full text
Get full text
Get full text
masterThesis -
114
Forecasting the nearly unforecastable: why aren’t airline bookings adhering to the prediction algorithm?
Published 2021“…The resulting model achieves an 89% predictive accuracy using historical data. A unique aspect of the model is the incorporation of self-competence, where the model defers when it cannot reasonably make a recommendation. …”
-
115
Prediction of EV Charging Behavior Using Machine Learning
Published 2021“…Using data-driven tools and machine learning algorithms to learn the EV charging behavior can improve scheduling algorithms. …”
Get full text
article -
116
-
117
Scalable parallel algorithms for dynamic programming on tree decomposition. (c2017)
Published 2017Get full text
Get full text
Get full text
masterThesis -
118
Salp swarm algorithm: survey, analysis, and new applications
Published 2024“…In this paper, the most important literature and previous studies related to the subject of the study were presented, where nearly 30 researches were referred to develop a theoretical framework related to SSA and other improved algorithms and to compare SSA with other systems. …”
Get full text
-
119
Exploring Sentiment Analysis using Different Machine Learning Algorithms on Dialectal Arabic
Published 2021“…Therefore, big data analytics field emerged to tame the generated big data, and use it to provide useful insights to the world. …”
Get full text
-
120
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…There are a variety of ways in which AI technology can aid in the growth and profitability of a variety of industries. Such data can be parsed using ML and AI approaches in designed to check attacks on CPSs. …”
Get full text
Get full text