بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
element based » event based (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
element based » event based (توسيع البحث)
-
21
-
22
Indexing Arabic texts using association rule data mining
منشور في 2019"…The model denotes extracting new relevant words by relating those chosen by previous classical methods to new words using data mining rules. Design/methodology/approach The proposed model uses an association rule algorithm for extracting frequent sets containing related items – to extract relationships between words in the texts to be indexed with words from texts that belong to the same category. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
23
A method for data path synthesis using neural networks
منشور في 2017"…Presents a deterministic parallel algorithm to solve the data path allocation problem in high-level synthesis. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
24
Topics in graph algorithms
منشور في 2003"…This is achieved by implementing some algorithms for the vertex cover problem, and conducting experiments on real data sets. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
25
-
26
Data Generation for Path Testing
منشور في 2004احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
27
An enhanced quorum selection algorithm
منشور في 2009احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
28
An Improved Quorum Selection Algorithm
منشور في 2008احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
29
Cryptocurrency Exchange Market Prediction and Analysis Using Data Mining and Artificial Intelligence
منشور في 2020"…One of the best algorithms in terms of the result is the Long Short Term Memory (LSTM) since it is based on recurrent neural networks which uses loop as a method to learn from heuristics data. …"
احصل على النص الكامل
-
30
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
منشور في 2022"…We present the new framework for the detection of cyberattacks, which makes use of AI and ML. …"
احصل على النص الكامل
احصل على النص الكامل
-
31
Allocation and re-allocation of data in a grid using an adaptive genetic algorithm
منشور في 2006"…Allocation and re-allocation of data in a grid using an adaptive genetic algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
32
Robust Control Of Sampled Data Systems
منشور في 2020"…The authors present robust stability bounds for sampled data systems. …"
احصل على النص الكامل
article -
33
Robust Control Of Sampled Data Systems
منشور في 2020"…The authors present robust stability bounds for sampled data systems. …"
احصل على النص الكامل
article -
34
Robust Control Of Sampled Data Systems
منشور في 2020"…The bounds are derived for the general case of additive perturbation in a system, and the control gain matrices for continuous time systems under discrete state feedback control. They then present a numerical controller design algorithm based on the derived bounds.Examples are used for demonstration.…"
احصل على النص الكامل
article -
35
Oversampling techniques for imbalanced data in regression
منشور في 2024"…For such high-dimension data our approach outperforms the Synthetic Minority Oversampling Technique for Regression (SMOTER) algorithm for the IMDB-WIKI and AgeDB image datasets. …"
-
36
Practical single node failure recovery using fractional repetition codes in data centers
منشور في 2016"…Hence, a practical solution for node failures is presented by using a self-designed genetic algorithm that searches within the feasible solution space. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
37
Data Redundancy Management in Connected Environments
منشور في 2020"…., building) equipped with sensors that produce and exchange raw data. Although the sensed data is considered to contain useful and valuable information, yet it might include various inconsistencies such as data redundancies, anomalies, and missing values. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
38
Unsupervised outlier detection in multidimensional data
منشور في 2022"…Furthermore, two proposed techniques presented in this paper use transformation of data to a unidimensional distance space to detect the outliers, so irrespective of the data’s high dimensions, the techniques remain computationally inexpensive and feasible. …"
-
39
-
40
Efficient Approximate Conformance Checking Using Trie Data Structures
منشور في 2021"…By encoding the proxy behavior using a trie data structure, we obtain a logarithmically reduced search space for alignment computation compared to a set-based representation. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل