بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
using algorithms » cosine algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithms » cosine algorithm (توسيع البحث)
-
121
Data Generation for Path Testing
منشور في 2004احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
122
BUC algorithm for iceberg cubes
منشور في 2003"…The Uniform distribution is used as a basis for comparison. Results show that when the cube is sparse there is a correlation between the data distribution and the running time of the algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
123
An enhanced quorum selection algorithm
منشور في 2009احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
124
An Improved Quorum Selection Algorithm
منشور في 2008احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
125
Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques
منشور في 2020"…The obtained results illustrate the efficacy of the proposed algorithm to analyze the time series data from the IoT devices for spam detection.…"
-
126
-
127
Design Optimization of Inductive Power Transfer Systems Considering Bifurcation and Equivalent AC Resistance for Spiral Coils
منشور في 2020"…<p>This paper presents a design optimization algorithm for series-series compensated Inductive Power Transfer (IPT) system based on flat spiral coils, considering bifurcation phenomenon and AC equivalent resistance of the coils. …"
-
128
The use of multi-task learning in cybersecurity applications: a systematic literature review
منشور في 2024"…Five critical applications, such as network intrusion detection and malware detection, were identified, and several tasks used in these applications were observed. Most of the studies used supervised learning algorithms, and there were very limited studies that focused on other types of machine learning. …"
-
129
-
130
A Novel Big Data Classification Technique for Healthcare Application Using Support Vector Machine, Random Forest and J48
منشور في 2022"…The performance of the algorithms for accuracy was evaluated using the Healthcare (heart attack possibility) dataset, freely available on kagle. …"
احصل على النص الكامل
-
131
Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT
منشور في 2021"…This paper proposes an Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT. …"
-
132
QU-GM: An IoT Based Glucose Monitoring System From Photoplethysmography, Blood Pressure, and Demographic Data Using Machine Learning
منشور في 2024"…We collected PPG signals, demographic information, and blood pressure data from 139 diabetic (49.65%) and non-diabetic (50.35%) subjects. …"
-
133
Calibration of building model based on indoor temperature for overheating assessment using genetic algorithm: Methodology, evaluation criteria, and case study
منشور في 2022"…It was found that the calibrated model achieved these metrics with RMSE of 0.3 ◦C, and MAD of 0.8 ◦C, and 85% of data points with an error less than 0.5 ◦C for a school building case.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
134
A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems
منشور في 2025"…<p dir="ltr">Federated Learning (FL) is gaining traction in Android-based consumer electronics, enabling collaborative model training across decentralized devices while preserving data privacy. However, the increasing adoption of FL in these devices exposes them to adversarial attacks that can compromise user data and device security. …"
-
135
Stochastic Search Algorithms for Exam Scheduling
منشور في 2007"…Then, we empirically compare the three proposed algorithms and FESP using realistic data. Our experimental results show that SA and GA produce good exam schedules that are better than those of FESP heuristic procedure. …"
احصل على النص الكامل
احصل على النص الكامل
article -
136
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
منشور في 2024"…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …"
-
137
-
138
-
139
Data Redundancy Management in Connected Environments
منشور في 2020"…., building) equipped with sensors that produce and exchange raw data. Although the sensed data is considered to contain useful and valuable information, yet it might include various inconsistencies such as data redundancies, anomalies, and missing values. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
140
Unsupervised outlier detection in multidimensional data
منشور في 2022"…<p>Detection and removal of outliers in a dataset is a fundamental preprocessing task without which the analysis of the data can be misleading. Furthermore, the existence of anomalies in the data can heavily degrade the performance of machine learning algorithms. …"