بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
event based » agent based (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
event based » agent based (توسيع البحث)
-
121
IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture
منشور في 2025"…The IoMT manufacturers need to offer their products at a competitive price, which forces them to use simplified architecture, leaving limited and, to some extent, no scope to employ sophisticated cybersecurity algorithms. …"
-
122
UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data
منشور في 2024"…To improve the effectiveness and efficiency of the UniBFS algorithm, Redundant Features Elimination algorithm (RFE) is presented in this paper. …"
-
123
-
124
PILE-UP FREE PARAMETER ESTIMATION AND DIGITAL ONLINE PEAK LOCALIZATION ALGORITHMS FOR GAMMA RAY SPECTROSCOPY
منشور في 2020"…A number of parameter estimation and digital online peak localisation algorithms are being developed, including a pulse classification technique which uses a simple peak search routine based on the smoothed first derivative method, which gave a percentage error of peak amplitude of less than 0.1. …"
احصل على النص الكامل
article -
125
-
126
Prediction of pressure gradient for oil-water flow: A comprehensive analysis on the performance of machine learning algorithms
منشور في 2022"…The values are 18.44 % and 23.9 % for CV-RMSE, 11.6 % and 10.06 % for MAPE, and 7.5 % and 6.75 % for MdAPE, using ANN and GP, respectively. While the previous studies mostly used ANN to demonstrate the capability of MLs to predict PG over the mechanistic or correlation-based models, the present research has shown that GP is even better than ANN using a wide range of FPs and a large data set.…"
-
127
Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation
منشور في 2022"…We describe our differentially-private model with flexible constraints and a dynamic window algorithm to maintain the privacy-budget loss in infinitely generated time-series data. …"
-
128
Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem
منشور في 2016"…The research note is presented in two parts: Part A presents an overview of REBUS, including its development, algorithm, and its primary functions. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
129
Android Malware Detection Using Machine Learning
منشور في 2024"…Detecting and preventing malware is crucial for several reasons, including the security of personal information, data loss and tampering, system disruptions, financial losses, and reputation damage. …"
احصل على النص الكامل
article -
130
Improved search-tree algorithms for the cluster edit problem. (c2011)
منشور في 2011احصل على النص الكامل
احصل على النص الكامل
masterThesis -
131
Using genetic algorithms to optimize software quality estimation models
منشور في 2004"…In the first approach, we assume the existence of several models, and we use a genetic algorithm to combine them, and adapt them to a given data set. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
132
Enhanced simulated evolution algorithm for digital circuit design yielding faster execution in a larger solution space
منشور في 2004"…Evolutionary algorithms have been studied by several researchers for the design of digital circuits. …"
احصل على النص الكامل
احصل على النص الكامل
article -
133
An efficient approach for textual data classification using deep learning
منشور في 2022"…<p dir="ltr">Text categorization is an effective activity that can be accomplished using a variety of classification algorithms. In machine learning, the classifier is built by learning the features of categories from a set of preset training data. …"
-
134
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
منشور في 2022"…The method used in this research is a classification of models and algorithms used in data mining. …"
احصل على النص الكامل
-
135
Process Mining over Unordered Event Streams
منشور في 2020"…This requires online algorithms that, instead of keeping the whole history of event data, work incrementally and update analysis results upon the arrival of new events. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
136
Data Embedding in HEVC Video by Modifying the Partitioning of Coding Units
منشور في 2019"…The flags pertaining to 16x16 sub CUs are used as a cover for data embedding, where 6 or 4 message bits are embedded per CU. …"
احصل على النص الكامل
article -
137
-
138
-
139
Intelligent Bilateral Client Selection in Federated Learning Using Game Theory
منشور في 2022"…To overcome this problem, we present in this paper FedMint, an intelligent client selection approach for federated learning on IoT devices using game theory and bootstrapping mechanism. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
140
Implementation and Comparison of Particle Swarm Optimization and Genetic Algorithm Techniques in Combined Economic Emission Dispatch of an Independent Power Plant
منشور في 2019"…<div><p>This paper presents the optimization of fuel cost, emission of NOX, COX, and SOX gases caused by the generators in a thermal power plant using penalty factor approach. …"