Search alternatives:
would algorithm » mould algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
Showing 121 - 140 results of 328 for search '(( data processing algorithms ) OR ((( develop would algorithm ) OR ( element data algorithm ))))', query time: 0.13s Refine Results
  1. 121

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare by Haraty, Ramzi A.

    Published 2007
    “…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  2. 122

    KNNOR: An oversampling technique for imbalanced datasets by Ashhadul Islam (16869981)

    Published 2021
    “…The proposed technique called K-Nearest Neighbor OveRsampling approach (KNNOR) performs a three step process to identify the critical and safe areas for augmentation and generate synthetic data points of the minority class. …”
  3. 123

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group by Iqtadar Hussain (14147850)

    Published 2023
    “…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …”
  4. 124

    Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images by Ahila A (18394806)

    Published 2022
    “…Over the decade, numerous artificial neural network (ANN)-based techniques were adopted in order to diagnose and classify breast cancer due to the unique characteristics of learning key features from complex data via a training process. However, these schemes have limitations like slow convergence and longer training time. …”
  5. 125

    Multi Self-Organizing Map (SOM) Pipeline Architecture for Multi-View Clustering by Saadia Jamil (22045946)

    Published 2024
    “…A self-organizing map is one of the well-known unsupervised neural network algorithms used for preserving typologies during mapping from the input space (high-dimensional) to the display (low-dimensional).An algorithm called Local Adaptive Receptive Field Dimension Selective Self-Organizing Map 2 is a modified form of a self-organizing Map to cater different data types in the dataset. …”
  6. 126

    Spider monkey optimizations: application review and results by Abualigah, Laith

    Published 2024
    “…Optimization algorithms are applied to find efficient solutions in different problems in several fields such as the routing in wireless networks, cloud computing, big data, image processing and scheduling, and so forth. …”
    Get full text
  7. 127

    Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights by Malekloo, Arman

    Published 2021
    “…Connecting the ubiquitous sensing and big data processing of critical information in infrastructures through the IoT paradigm is the future of SHM systems. …”
    Get full text
    article
  8. 128
  9. 129

    Prediction of pressure gradient for oil-water flow: A comprehensive analysis on the performance of machine learning algorithms by Md Ferdous Wahid (13485799)

    Published 2022
    “…This study aims to develop five robust machine learning (ML) algorithms and their fusions for a wide range of flow patterns (FP) regimes. …”
  10. 130

    Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators by Abu Zitar, Raed

    Published 2021
    “…The outcomes of the DNA microarray is a table/matrix, called gene expression data. Pattern recognition algorithms are widely applied to gene expression data to differentiate between health and cancerous patient samples. …”
    Get full text
  11. 131
  12. 132
  13. 133

    Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE by SHWEDEH, FATEN

    Published 2018
    “…Educational Data Mining (EDM) is the process of discovering information and relationships from educational data for better understanding of students’ performance, and characteristics of their education providers. …”
    Get full text
  14. 134

    Machine Learning Approach for the Design of an Assessment Outcomes Recommendation System by Abu Zitar, Raed

    Published 2021
    “…It is believed that the evaluation of the outcomes of the course, based on grades, is necessary to improve the teaching and learning process. Our research processes and workflows supported by AI utilize machine learning technology in order to interpret big data, analyze broad data sets and recognize associations with more reliably. …”
    Get full text
    Get full text
  15. 135

    Exploring the Impact of Explainable Artificial Intelligence on Decision-making in Healthcare by MOHAMMAD, AHMAD HASAN

    Published 2023
    “…The study analyses the benefits and limitations of applying XAI in healthcare decision-making processes through an exhaustive analysis of current literature and empirical data. …”
    Get full text
  16. 136

    FarmTech: Regulating the use of digital technologies in the agricultural sector by Imad Antoine Ibrahim (14158998)

    Published 2023
    “…<p dir="ltr">Farming relies on the accurate collection and processing of data. Algorithms utilizing artificial intelligence can predict patterns and spot problems, helping farmers make more informed decisions. …”
  17. 137
  18. 138

    Cyberbullying Detection Model for Arabic Text Using Deep Learning by Albayari, Reem

    Published 2023
    “…Hence, detecting any act of cyberbullying in an automated manner will be helpful for stakeholders to prevent any unfortunate results from the victim’s perspective. Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …”
    Get full text
    Get full text
  19. 139

    TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection by Zina Chkirbene (16869987)

    Published 2020
    “…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …”
  20. 140