بدائل البحث:
data algorithms » jaya algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
يعرض 141 - 160 نتائج من 687 نتيجة بحث عن '(((( elements mapping algorithm ) OR ( element data algorithms ))) OR ( data using algorithm ))*', وقت الاستعلام: 0.14s تنقيح النتائج
  1. 141

    Unsupervised outlier detection in multidimensional data حسب Atiq ur Rehman (14153391)

    منشور في 2022
    "…<p>Detection and removal of outliers in a dataset is a fundamental preprocessing task without which the analysis of the data can be misleading. Furthermore, the existence of anomalies in the data can heavily degrade the performance of machine learning algorithms. …"
  2. 142

    Android Malware Detection Using Machine Learning حسب Al Ali, Shaikha

    منشور في 2024
    "…Detecting and preventing malware is crucial for several reasons, including the security of personal information, data loss and tampering, system disruptions, financial losses, and reputation damage. …"
    احصل على النص الكامل
    article
  3. 143

    Performance of artificial intelligence models in estimating blood glucose level among diabetic patients using non-invasive wearable device data حسب Arfan Ahmed (17541309)

    منشور في 2023
    "…One of the key aspects of WDs with machine learning (ML) algorithms is to find specific data signatures, called Digital biomarkers, that can be used in classification or gaging the extent of the underlying condition. …"
  4. 144

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment حسب Zakaria Tolba (16904718)

    منشور في 2022
    "…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …"
  5. 145

    Delay Optimization in LoRaWAN by Employing Adaptive Scheduling Algorithm With Unsupervised Learning حسب Zulfiqar Ali (117651)

    منشور في 2023
    "…This paper aims to optimize the delay in LoRaWAN by using an Adaptive Scheduling Algorithm (ASA) with an unsupervised probabilistic approach called Gaussian Mixture Model (GMM). …"
  6. 146
  7. 147
  8. 148

    Graph Contraction for Mapping Data on Parallel Computers حسب Mansour, N.

    منشور في 1994
    "…We then present experimental results on using contracted graphs as inputs to two physical optimization methods; namely, genetic algorithm and simulated annealing. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 149

    Mapping realistic data sets on parallel computers حسب Mansour, N.

    منشور في 1993
    "…The GC algorithm allows large-scale mapping to become efficient, especially when slow but high-quality mappers are used.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  10. 150

    Parallel genetic algorithm for disease-gene association حسب Mansour, Nashat

    منشور في 2011
    "…In this work, we combine few successful strategies from the literature and present a parallel genetic algorithm for the Tag SNP Selection problem. Our results compared favorably with those of a recognized tag SNP selection algorithm using three different data sets from the HapMap project.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  11. 151
  12. 152

    Particle swarm optimization algorithm: review and applications حسب Abualigah, Laith

    منشور في 2024
    "…The main procedure of the PSO algorithm is presented. Future researchers can use the collected data in this survey as baseline information on the PSO and PSO's applications.…"
    احصل على النص الكامل
  13. 153

    New enumeration algorithm for regular boolean functions حسب Nasrallah, Walid F.

    منشور في 2018
    "…This algorithm exploits the equivalence between regular Boolean functions and positive threshold functions that can be used to represent instances of the knapsack problem. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  14. 154
  15. 155

    The Effects of Data Mining on Small Businesses in Dubai حسب AlMutawa, Rasha

    منشور في 2011
    "…While there are numerous studies on the best data mining models and their uses, even on certain industries, this study focuses on the applications more than the algorithms and models and their usefulness for small businesses specifically. …"
    احصل على النص الكامل
  16. 156

    Spider monkey optimizations: application review and results حسب Abualigah, Laith

    منشور في 2024
    "…Optimization algorithms are applied to find efficient solutions in different problems in several fields such as the routing in wireless networks, cloud computing, big data, image processing and scheduling, and so forth. …"
    احصل على النص الكامل
  17. 157

    A Hybrid Fault Detection and Diagnosis of Grid-Tied PV Systems: Enhanced Random Forest Classifier Using Data Reduction and Interval-Valued Representation حسب Khaled Dhibi (16891524)

    منشور في 2021
    "…The proposed approach deals with system uncertainties (current/voltage variability, noise, measurement errors, ⋯) by using an interval-valued data representation, and with large-scale systems by using a dataset size-reduction framework. …"
  18. 158

    An Effective Hybrid NARX-LSTM Model for Point and Interval PV Power Forecasting حسب Mohamed Massaoudi (16888710)

    منشور في 2021
    "…First, the NARXNN model acquires the data to generate a residual error vector. Then, the stacked LSTM model, optimized by Tabu search algorithm, uses the residual error correction associated with the original data to produce a point and interval PVPF. …"
  19. 159

    Intelligent Bilateral Client Selection in Federated Learning Using Game Theory حسب Wehbi, Osama

    منشور في 2022
    "…To overcome this problem, we present in this paper FedMint, an intelligent client selection approach for federated learning on IoT devices using game theory and bootstrapping mechanism. Our solution involves designing (1) preference functions for the client IoT devices and federated servers to allow them to rank each other according to several factors such as accuracy and price, (2) intelligent matching algorithms that take into account the preferences of both parties in their design, and (3) bootstrapping technique that capitalizes on the collaboration of multiple federated servers in order to assign initial accuracy value for the new connected IoT devices. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  20. 160

    Convergence behavior of the normalized least mean fourth algorithm حسب Zerguine, A.

    منشور في 2000
    "…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article