بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
-
101
Simultaneous identification of robust synergistic subnetwork markers for effective cancer prognosis
منشور في 2014"…<p>Accurate prediction of cancer prognosis based on gene expression data is generally difficult, and identifying robust prognostic markers for cancer remains a challenging problem. …"
-
102
Assessment of four dose calculation algorithms using IAEA-TECDOC-1583 with medium dependency correction factor (K<sub>med</sub>) application
منشور في 2024"…K<sub>med</sub> is calculated for D<sub>m.m</sub> and D<sub>w.w </sub>algorithm types in bone and lung media for both photon beams. …"
-
103
-
104
-
105
A multi-pretraining U-Net architecture for semantic segmentation
منشور في 2025"…In this research, we propose and evaluate a modified version of a deep learning algorithm called U-Net architecture for partitioning histopathological images. …"
-
106
From low-cost sensors to high-quality data: A summary of challenges and best practices for effectively calibrating low-cost particulate matter mass sensors
منشور في 2021"…The methods for correcting and calibrating these biases and dependencies that have been used in the literature likewise range from simple linear and quadratic models to complex machine learning algorithms. Here we review the needs and challenges when trying to get high-quality data from low-cost sensors. …"
-
107
Building power consumption datasets: Survey, taxonomy and future directions
منشور في 2020"…The latter will be very useful for testing and training anomaly detection algorithms, and hence reducing wasted energy. Moving forward, a set of recommendations is derived to improve datasets collection, such as the adoption of multi-modal data collection, smart Internet of things data collection, low-cost hardware platforms and privacy and security mechanisms. …"
-
108
-
109
-
110
Improving the Resilience of Smart Distribution Networks against Cyber Attacks
منشور في 2022احصل على النص الكامل
doctoralThesis -
111
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
منشور في 2024"…In this research, a novel dataset of fake job postings is proposed, formed by the combination of job postings from three different sources. Existing benchmark datasets are outdated and limited due to knowledge of specific job postings, which limits the existing models’ capability in detecting fraudulent jobs. …"
-
112
Information reconciliation through agent controlled graph model. (c2018)
منشور في 2018"…Even though prevention techniques exist, they’re not enough to fully secure the data from malicious activities. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
113
-
114
-
115
Multi-Robot Map Exploration Based on Multiple Rapidly-Exploring Randomized Trees
منشور في 2017احصل على النص الكامل
doctoralThesis -
116
Nested ensemble selection: An effective hybrid feature selection method
منشور في 2023"…The NES algorithm achieves perfect precision on the synthetic data and near optimal accuracy on the real-life data. …"
احصل على النص الكامل
article -
117
-
118
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
منشور في 2022"…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
احصل على النص الكامل
-
119
Artificial Intelligence Driven Smart Farming for Accurate Detection of Potato Diseases: A Systematic Review
منشور في 2024"…It has been learned that image-processing techniques overwhelm the existing research and have the potential to integrate meteorological data. …"
-
120
Information warfare. (c2015)
منشور في 2015"…The age of Internet Technology that we are in has introduced new types of attacks to new assets that didn’t exist before. Databases that represent Information assets are subject to attacks that have malicious intentions such as steeling sensitive data, deleting records or violating the integrity of the database. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis