Search alternatives:
processing algorithm » processing algorithms (Expand Search)
learning algorithm » learning algorithms (Expand Search)
element learning » student learning (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
processing algorithm » processing algorithms (Expand Search)
learning algorithm » learning algorithms (Expand Search)
element learning » student learning (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
-
101
Information warfare recovery-fighting back through the matrix. (c2012)
Published 2012Get full text
Get full text
masterThesis -
102
-
103
Distributed Tree-Based Machine Learning for Short-Term Load Forecasting With Apache Spark
Published 2021“…The paper proposes a concurrent job scheduling algorithm in a multi-energy data source environment using Apache Spark. …”
-
104
-
105
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
Published 2024“…As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. There are many machine-learning and deep-learning algorithms have been developed by researchers. …”
-
106
-
107
-
108
Practical Multiple Node Failure Recovery in Distributed Storage Systems
Published 2016Get full text
Get full text
Get full text
Get full text
conferenceObject -
109
-
110
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
Published 2020“…However, high dimensional data present a significant challenge for machine learning techniques. …”
-
111
An enhanced quorum selection algorithm
Published 2009Get full text
Get full text
Get full text
article -
112
An Improved Quorum Selection Algorithm
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
113
Random Forest Bagging and X‐Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data
Published 2021“…In addition, for grouping similar antipatterns, a clustering process was performed to eradicate the design errors. …”
-
114
Severity-Based Prioritized Processing of Packets with Application in VANETs
Published 2019“…In this study, we propose a generic prioritization and resource management algorithm that can be used to prioritize processing of received packets in vehicular networks. …”
-
115
Robust Control Of Sampled Data Systems
Published 2020“…The authors present robust stability bounds for sampled data systems. …”
Get full text
article -
116
Robust control of sampled data systems
Published 1998“…The authors present robust stability bounds for sampled data systems. …”
Get full text
Get full text
article -
117
Robust Control Of Sampled Data Systems
Published 2020“…The authors present robust stability bounds for sampled data systems. …”
Get full text
article -
118
Robust Control Of Sampled Data Systems
Published 2020“…The authors present robust stability bounds for sampled data systems. …”
Get full text
article -
119
Oversampling techniques for imbalanced data in regression
Published 2024“…For such high-dimension data our approach outperforms the Synthetic Minority Oversampling Technique for Regression (SMOTER) algorithm for the IMDB-WIKI and AgeDB image datasets. …”
-
120
Bee Colony Algorithm for Proctors Assignment.
Published 2015“…The Bee Colony algorithm is a recent population-based search algorithm that mimics the natural behavior of swarms of honey bees during the process of collecting food. …”
Get full text
Get full text
Get full text
article