بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
development rd » development _ (توسيع البحث), development a (توسيع البحث), development q (توسيع البحث)
mesh algorithm » deer algorithm (توسيع البحث), search algorithm (توسيع البحث)
rd algorithm » _ algorithms (توسيع البحث)
element » elements (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
development rd » development _ (توسيع البحث), development a (توسيع البحث), development q (توسيع البحث)
mesh algorithm » deer algorithm (توسيع البحث), search algorithm (توسيع البحث)
rd algorithm » _ algorithms (توسيع البحث)
element » elements (توسيع البحث)
-
41
-
42
Genetic and heuristic algorithms for regrouping service sites. (c2000)
منشور في 2000احصل على النص الكامل
احصل على النص الكامل
masterThesis -
43
A Survey of Data Clustering Techniques
منشور في 2023"…Clustering, an unsupervised learning technique, aims to identify a specific number of clusters to effectively categorize the data through data grouping. Hence, clustering is related to many fields and is used in various applications that deal with large datasets. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
44
-
45
Clustering/partitioning algorithms and comparative analysis
منشور في 1989احصل على النص الكامل
احصل على النص الكامل
masterThesis -
46
-
47
A multi-class discriminative motif finding algorithm for autosomal genomic data. (c2015)
منشور في 2016"…New technologies, such as Next-Generation Genome Sequencing, can now provide huge amounts of data in little time. Big initiatives such as the International Hapmap Project and the 1000 Genome project are making use of these technologies to provide the scientific community with a detailed genetic reference from different populations. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
48
-
49
-
50
Capturing outline of fonts using genetic algorithm and splines
منشور في 2001"…Some examples are given to show the results obtained from the algorithm…"
احصل على النص الكامل
احصل على النص الكامل
article -
51
-
52
Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation
منشور في 2022"…We describe our differentially-private model with flexible constraints and a dynamic window algorithm to maintain the privacy-budget loss in infinitely generated time-series data. …"
-
53
A method for data path synthesis using neural networks
منشور في 2017احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
54
Indexing Arabic texts using association rule data mining
منشور في 2019"…The model denotes extracting new relevant words by relating those chosen by previous classical methods to new words using data mining rules. Design/methodology/approach The proposed model uses an association rule algorithm for extracting frequent sets containing related items – to extract relationships between words in the texts to be indexed with words from texts that belong to the same category. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
55
Using genetic algorithms to optimize software quality estimation models
منشور في 2004"…In the first approach, we assume the existence of several models, and we use a genetic algorithm to combine them, and adapt them to a given data set. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
56
An efficient approach for textual data classification using deep learning
منشور في 2022"…<p dir="ltr">Text categorization is an effective activity that can be accomplished using a variety of classification algorithms. In machine learning, the classifier is built by learning the features of categories from a set of preset training data. …"
-
57
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
منشور في 2022"…The method used in this research is a classification of models and algorithms used in data mining. …"
احصل على النص الكامل
-
58
-
59
Data Embedding in HEVC Video by Modifying the Partitioning of Coding Units
منشور في 2019"…The flags pertaining to 16x16 sub CUs are used as a cover for data embedding, where 6 or 4 message bits are embedded per CU. …"
احصل على النص الكامل
article -
60