يعرض 161 - 180 نتائج من 958 نتيجة بحث عن '(((( implementing a algorithm ) OR ( elements data algorithm ))) OR ( data using algorithm ))', وقت الاستعلام: 0.14s تنقيح النتائج
  1. 161
  2. 162

    A new tabu search algorithm for the long-term hydro scheduling problem حسب Mantawy, A.H.

    منشور في 2002
    "…A new efficient algorithm to solve the long-term hydro scheduling problem (LTHSP) is presented in this paper. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 163

    Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques حسب Ameema Zainab (16864263)

    منشور في 2020
    "…The obtained results illustrate the efficacy of the proposed algorithm to analyze the time series data from the IoT devices for spam detection.…"
  4. 164

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method حسب Amit Kumar Balyan (18288964)

    منشور في 2022
    "…To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …"
  5. 165
  6. 166
  7. 167
  8. 168
  9. 169
  10. 170

    Nonlinear analysis of shell structures using image processing and machine learning حسب M.S. Nashed (16392961)

    منشور في 2023
    "…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …"
  11. 171
  12. 172

    The use of multi-task learning in cybersecurity applications: a systematic literature review حسب Shimaa Ibrahim (22155739)

    منشور في 2024
    "…Five critical applications, such as network intrusion detection and malware detection, were identified, and several tasks used in these applications were observed. Most of the studies used supervised learning algorithms, and there were very limited studies that focused on other types of machine learning. …"
  13. 173
  14. 174
  15. 175
  16. 176

    Correlation Clustering with Overlaps حسب Fakhereldine, Amin

    منشور في 2020
    "…Moreover, we allow the new vertex splitting operation, which allows the resulting clusters to overlap. In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  17. 177

    Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT حسب Arumugam K (18456690)

    منشور في 2021
    "…This paper proposes an Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT. …"
  18. 178
  19. 179

    A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks حسب Saad, Walid

    منشور في 2012
    "…In this work, we propose a utility-based joint uplink/downlink scheduling algorithm suitable for wireless services involving pairwise communication among mobile users. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 180

    Boosting the visibility of services in microservice architecture حسب Ahmet Vedat Tokmak (17773479)

    منشور في 2023
    "…In this research, we evaluate the performance of several classification algorithms for estimating the quality of microservices using the QWS dataset containing traffic data of 2505 microservices. …"