بدائل البحث:
modeling algorithm » scheduling algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
modeling algorithm » scheduling algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
-
161
Machine Learning Approach for the Design of an Assessment Outcomes Recommendation System
منشور في 2021"…A modern algorithm was improvised for this reason. For our proposed recommendation system, a database program was created to store data and include details in the analysis of course learning outcomes. …"
احصل على النص الكامل
احصل على النص الكامل
-
162
From low-cost sensors to high-quality data: A summary of challenges and best practices for effectively calibrating low-cost particulate matter mass sensors
منشور في 2021"…We also present a set of best practices to follow to obtain high-quality data from these low-cost sensors.…"
-
163
The use of multi-task learning in cybersecurity applications: a systematic literature review
منشور في 2024"…Cybersecurity has become vital in information technology, with data protection being a major priority. Despite government and corporate efforts, cybersecurity remains a significant concern. …"
-
164
IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture
منشور في 2025"…The IoMT sector deals with valuable, confidential healthcare-related data and offers convenient, personalized healthcare services. …"
-
165
-
166
Simple and effective neural-free soft-cluster embeddings for item cold-start recommendations
منشور في 2022"…CIP can be used in conjunction with relevance ranking metrics like NDCG and MAP to measure the effectiveness of the cold-start recommendation algorithm.…"
-
167
Information warfare recovery-fighting back through the matrix. (c2012)
منشور في 2012احصل على النص الكامل
احصل على النص الكامل
masterThesis -
168
-
169
C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments
منشور في 2023"…Further, no indication is given of how close the trace is to termination—a highly relevant measure in a streaming setting. This paper introduces a novel approximate streaming conformance checking algorithm that enriches prefix-alignments with confidence and completeness measures. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
170
A synchronous/asynchronous multi-master replication method. (c2007)
منشور في 2007احصل على النص الكامل
احصل على النص الكامل
masterThesis -
171
Building power consumption datasets: Survey, taxonomy and future directions
منشور في 2020"…Accordingly, a novel visualization strategy based on using power consumption micro-moments has been presented along with an example of deploying machine learning algorithms to classify the micro-moment classes and identify anomalous power usage.…"
-
172
-
173
Single channel speech denoising by DDPG reinforcement learning agent
منشور في 2025"…In this paper, a novel SD algorithm is presented based on the deep deterministic policy gradient (DDPG) agent; an off-policy reinforcement learning (RL) agent with a continuous action space. …"
-
174
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
منشور في 2020"…However, high dimensional data present a significant challenge for machine learning techniques. …"
-
175
Correlation Clustering with Overlaps
منشور في 2020"…We present a heuristic algorithm and a semi-exact algorithm for the Multi-Parameterized Cluster Editing with Vertex Splitting problem. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
176
-
177
A hybrid cryptosystem based on WEP for 802.11 networks. (c2006)
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
masterThesis -
178
Nested ensemble selection: An effective hybrid feature selection method
منشور في 2023"…It has been shown that while feature selection algorithms are able to distinguish between relevant and irrelevant features, they fail to differentiate between relevant and redundant and correlated features. …"
احصل على النص الكامل
article -
179
Digital twin in energy industry: Proposed robust digital twin for power plant and other complex capital-intensive large engineering systems
منشور في 2022"…Data-driven algorithms with capabilities to predict the system’s dynamic behavior still need to be developed. …"
-
180
Information warfare. (c2015)
منشور في 2015"…Numerous damage assessment and recovery algorithms have been proposed by researchers. In this work we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis