بدائل البحث:
modeling algorithm » scheduling algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
data modeling » data models (توسيع البحث), spatial modeling (توسيع البحث)
a algorithm » _ algorithms (توسيع البحث), rd algorithm (توسيع البحث), jaya algorithm (توسيع البحث)
develop a » developing a (توسيع البحث)
element » elements (توسيع البحث)
modeling algorithm » scheduling algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
data modeling » data models (توسيع البحث), spatial modeling (توسيع البحث)
a algorithm » _ algorithms (توسيع البحث), rd algorithm (توسيع البحث), jaya algorithm (توسيع البحث)
develop a » developing a (توسيع البحث)
element » elements (توسيع البحث)
-
181
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
منشور في 2022"…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
احصل على النص الكامل
-
182
-
183
A Survey of Audio Enhancement Algorithms for Music, Speech, Bioacoustics, Biomedical, Industrial, and Environmental Sounds by Image U-Net
منشور في 2023"…Although, there are dedicated audio processing DNNs, yet, many recent models of AE have utilized U-Net: a DNN based on Convolutional Neural Network (CNN), fundamentally developed for image segmentation. …"
-
184
Design and development of an embedded controller for roboticmanipulator
منشور في 1998"…The embedded controller is microprocessor based, which provides the designer with the advantage of using a highly-integrated processor and the ability to develop the software needed…"
احصل على النص الكامل
احصل على النص الكامل
article -
185
An Artificial Neural Network for Online Tuning of Genetic Algorithm Based PI Controller for Interior Permanent Magnet Synchronous Motor–Drive
منشور في 2006"…An artificial neural network (ANN) for online tuning of a genetic algorithm based PI controller for interior permanent magnet synchronous motor (IPMSM) drive is presented in this paper. …"
احصل على النص الكامل
article -
186
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
منشور في 2020"…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …"
-
187
A method for data path synthesis using neural networks
منشور في 2017"…Presents a deterministic parallel algorithm to solve the data path allocation problem in high-level synthesis. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
188
Indexing Arabic texts using association rule data mining
منشور في 2019"…Purpose The purpose of this paper is to propose a new model to enhance auto-indexing Arabic texts. The model denotes extracting new relevant words by relating those chosen by previous classical methods to new words using data mining rules. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
189
Data mining approach to predict student's selection of program majors
منشور في 2019"…The approach includes a methodology to manage data mining projects, sampling techniques to handle imbalanced data and multiclass data, a set of classification algorithms to predict and measures to evaluate performance of models. …"
احصل على النص الكامل
-
190
Eye-Clustering: An Enhanced Centroids Prediction for K-means Algorithm
منشور في 2024"…To achieve this goal, supervised machine learning was employed to train models on graphs with labeled data points, where each graph contains a set of points and a label indicating the centroid determined by K-means. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
191
Fixed-parameter algorithms for hitting set problems. (c2006)
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
masterThesis -
192
Online Fuzzy Logic Base Algorithm for Electricity Price Prediction
منشور في 2017"…Based on predicted electricity prices, consumers can turn ON/OFF or reschedule operations of their home appliances to reduce their electricity bill. The proposed algorithm was developed and hosted in a utility server (U-server). …"
احصل على النص الكامل
article -
193
Power Control Algorithms for Media Transmission in Remote Healthcare Systems
منشور في 2018"…Thus, this paper first proposes a transmission power control (TPC)-based energy-efficient algorithm (EEA) for when a subject is in different postures, i.e., standing, walking, and running, in wireless body sensor networks. …"
-
194
-
195
An efficient approach for textual data classification using deep learning
منشور في 2022"…<p dir="ltr">Text categorization is an effective activity that can be accomplished using a variety of classification algorithms. In machine learning, the classifier is built by learning the features of categories from a set of preset training data. …"
-
196
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
منشور في 2022"…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …"
احصل على النص الكامل
-
197
DAP: A dataset-agnostic predictor of neural network performance
منشور في 2024"…This task often must be repeated many times, especially when developing a new deep learning algorithm or performing a neural architecture search. …"
-
198
Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn...
منشور في 2020"…LR with the reduced feature set using the intersection between CS and RFE proved to be the best model among the tested algorithms. This model can be used in a clinical setting as a decision support system or for public health awareness as an informal risk prediction system. …"
احصل على النص الكامل
-
199
-
200
The use of multi-task learning in cybersecurity applications: a systematic literature review
منشور في 2024"…Cybersecurity has become vital in information technology, with data protection being a major priority. Despite government and corporate efforts, cybersecurity remains a significant concern. …"