بدائل البحث:
datb algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
data finding » data mining (توسيع البحث), data hiding (توسيع البحث)
rd algorithm » _ algorithms (توسيع البحث)
element » elements (توسيع البحث)
datb algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
data finding » data mining (توسيع البحث), data hiding (توسيع البحث)
rd algorithm » _ algorithms (توسيع البحث)
element » elements (توسيع البحث)
-
41
-
42
Enhancing Personalized Learning Experiences through AI-driven Analysis of xAPI Data
منشور في 2024"…The Experience API (xAPI) provides a comprehensive mechanism to document all types of learning interactions, storing this stream of data into the Learning Record Store (LRS). This dissertation explores the fusion of Artificial Intelligence (AI) techniques with the obtained xAPI data. …"
احصل على النص الكامل
-
43
-
44
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
منشور في 2007"…To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. Since even segmenting the log into clusters may not solve the problem, as clusters/segments may grow to be humongous in size, this is in case of high data/transaction dependency, we suggest a method for segmenting the log into clusters and its sub-clusters; i.e, segmenting the cluster; based on exact data dependency [12], into sub-clusters; based on two different criteria: number of data items or space occupied. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
45
-
46
Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators
منشور في 2021"…The outcomes of the DNA microarray is a table/matrix, called gene expression data. Pattern recognition algorithms are widely applied to gene expression data to differentiate between health and cancerous patient samples. …"
احصل على النص الكامل
-
47
Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE
منشور في 2018"…We examined different feature selection methods and classification algorithms to find the best prediction model with the highest accuracy. …"
احصل على النص الكامل
-
48
-
49
Implementation and Comparison of Particle Swarm Optimization and Genetic Algorithm Techniques in Combined Economic Emission Dispatch of an Independent Power Plant
منشور في 2019"…The results are of great significance as the real data of an IPP is used and imply that the performance of PSO is better than that of GA in case of CEED for finding the optimal solution concerning fuel cost, emission, convergence characteristics, and computational time. …"
-
50
-
51
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
منشور في 2022"…Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …"
-
52
-
53
Performance of artificial intelligence models in estimating blood glucose level among diabetic patients using non-invasive wearable device data
منشور في 2023"…One of the key aspects of WDs with machine learning (ML) algorithms is to find specific data signatures, called Digital biomarkers, that can be used in classification or gaging the extent of the underlying condition. …"
-
54
-
55
-
56
Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE
منشور في 2020"…The data analytics maturity model is used as the conceptual model for evaluating both data analytics and data governance in this research. …"
احصل على النص الكامل
-
57
Information warfare recovery-fighting back through the matrix. (c2012)
منشور في 2012احصل على النص الكامل
احصل على النص الكامل
masterThesis -
58
C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments
منشور في 2023"…The aim of streaming conformance checking is to find dis crepancies between process executions on streaming data and the refer ence process model. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
59
-
60
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
منشور في 2023"…Therefore, the suggested approach finds the main hole in undersea systems and fills it using robotic automation. …"