Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
data modeling » data models (Expand Search), spatial modeling (Expand Search)
presented » present (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
data modeling » data models (Expand Search), spatial modeling (Expand Search)
presented » present (Expand Search)
-
81
Predict Student Success and Performance factors by analyzing educational data using data mining techniques
Published 2022“…The model is then applied to data collected from a reputable university that included 126,698 records with twenty-six (26) initial data attributes. …”
Get full text
-
82
-
83
-
84
Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation
Published 2022“…We describe our differentially-private model with flexible constraints and a dynamic window algorithm to maintain the privacy-budget loss in infinitely generated time-series data. …”
-
85
Oversampling techniques for imbalanced data in regression
Published 2024“…For tabular data we conducted a comprehensive experiment using various models trained on both augmented and non-augmented datasets, followed by performance comparisons on test data. …”
-
86
Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE
Published 2018“…We examined different feature selection methods and classification algorithms to find the best prediction model with the highest accuracy. …”
Get full text
-
87
-
88
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
Published 2022“…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
-
89
-
90
A kernelization algorithm for d-Hitting Set
Published 2010“…In this paper, a kernelization algorithm for the 3-Hitting Set problem is presented along with a general kernelization for d -Hitting Set. …”
Get full text
Get full text
Get full text
article -
91
An improved kernelization algorithm for r-Set Packing
Published 2010“…We present a reduction procedure that takes an arbitrary instance of the r -Set Packing problem and produces an equivalent instance whose number of elements is in O(kr−1), where k is the input parameter. …”
Get full text
Get full text
Get full text
article -
92
Interval-Valued SVM Based ABO for Fault Detection and Diagnosis of Wind Energy Conversion Systems
Published 2022Subjects: -
93
-
94
An exact and general model order reduction technique for the finite element solution of elastohydrodynamic lubrication problems
Published 2017“…This work presents an exact and general model order reduction (MOR) technique for a fast finite element resolution of elastohydrodynamic lubrication (EHL) problems. …”
Get full text
Get full text
Get full text
Get full text
article -
95
The Effects of Data Mining on Small Businesses in Dubai
Published 2011“…While there are numerous studies on the best data mining models and their uses, even on certain industries, this study focuses on the applications more than the algorithms and models and their usefulness for small businesses specifically. …”
Get full text
-
96
Optimization of Commercially Off the Shelf (COTS) Electric Propulsion System for Low Speed Fuel Cell UAV
Published 2013Get full text
doctoralThesis -
97
Sentiment visualization of correlation of loneliness mapped through social intelligence analysis
Published 2024“…Social media platforms have become a valuable source of data to study this phenomenon.</p><h3>Objectives</h3><p dir="ltr">This paper aims to visualize the frequency of loneliness-related themes and topics in Twitter data. …”
-
98
Fuzzy simulated evolution algorithm for topology design of campusnetworks
Published 2000“…Fuzzy logic provides a suitable mathematical framework in such a situation. We present an approach based on the simulated evolution algorithm for the design of campus network topology. …”
Get full text
Get full text
article -
99
Intelligent Rapidly-Exploring Random Tree Star Algorithm
Published 2024Get full text
doctoralThesis -
100
Optimizing Document Classification: Unleashing the Power of Genetic Algorithms
Published 2023“…Additionally, our proposed model optimizes the features using a genetic algorithm. …”