بدائل البحث:
data selection » data injection (توسيع البحث)
يعرض 261 - 280 نتائج من 449 نتيجة بحث عن '(( data selection algorithm ) OR ( data ((optimization algorithm) OR (detection algorithm)) ))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 261
  2. 262

    Intelligent route to design efficient CO<sub>2</sub> reduction electrocatalysts using ANFIS optimized by GA and PSO حسب Majedeh Gheytanzadeh (17541927)

    منشور في 2022
    "…The primary purpose of this study is to establish a new model through machine learning methods; namely, adaptive neuro-fuzzy inference system (ANFIS) combined with particle swarm optimization (PSO) and genetic algorithm (GA) for the prediction of *CO (the key intermediate) adsorption energy as the efficiency metric. …"
  3. 263
  4. 264

    Land Use/Land Cover Changes Impact on Groundwater Level and Quality in the Northern Part of the United Arab Emirates حسب Elmahdy, Samy

    منشور في 2020
    "…Each pair of enhanced LULC maps (1990–2000, 2000–2010, 2010–2018, and 1990–2018) were used as input data for an image difference algorithm to monitor LULC changes. …"
    احصل على النص الكامل
    article
  5. 265
  6. 266
  7. 267

    A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study حسب Masurkar, Faeez

    منشور في 2022
    "…Further, As the quality of received signals differs at different sensing points as a result of the surface conditions of the specimen, the Self Adaptive Smart Algorithm (SASA) method was adopted to filter out the noise and accurately pinpoint the defect reflected wave packet which ultimately aids in better detection and localization. …"
    احصل على النص الكامل
  8. 268

    The use of multi-task learning in cybersecurity applications: a systematic literature review حسب Shimaa Ibrahim (22155739)

    منشور في 2024
    "…Five critical applications, such as network intrusion detection and malware detection, were identified, and several tasks used in these applications were observed. …"
  9. 269
  10. 270

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices حسب Neder Karmous (19743430)

    منشور في 2024
    "…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …"
  11. 271

    Practical Multiple Node Failure Recovery in Distributed Storage Systems حسب Itani, M.

    منشور في 2016
    "…Fast convergence validates the efficacy of our algorithms for different system parameters. Simulation results are shown to be close to optimal for the case of newly arriving blocks.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  12. 272

    Building power consumption datasets: Survey, taxonomy and future directions حسب Yassine Himeur (14158821)

    منشور في 2020
    "…Based on the analytical study, a novel dataset has been presented, namely Qatar university dataset, which is an annotated power consumption anomaly detection dataset. The latter will be very useful for testing and training anomaly detection algorithms, and hence reducing wasted energy. …"
  13. 273

    Effective dispatch strategies assortment according to the effect of the operation for an islanded hybrid microgrid حسب Sk.A. Shezan (21323048)

    منشور في 2022
    "…The proposed off-grid microgrid's CO<sub>2 </sub>emissions, total net present cost (NPC), and the Levelized cost of energy (LCOE) have all been optimized. In HOMER software, all the possible dispatch algorithms were analyzed, and the power system responses and reliability study were carried out using DIgSILENT PowerFactory. …"
  14. 274

    Enhancing building sustainability: A Digital Twin approach to energy efficiency and occupancy monitoring حسب Aya Nabil Sayed (17317006)

    منشور في 2024
    "…Our data-driven occupancy detection approach utilized Machine Learning (ML) algorithms to intelligently determine room occupancy, allowing for precise energy management based on real-time usage patterns. …"
  15. 275

    C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments حسب Raun, Kristo

    منشور في 2023
    "…The aim of streaming conformance checking is to find dis crepancies between process executions on streaming data and the refer ence process model. The state-of-the-art output from streaming confor mance checking is a prefix-alignment. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  16. 276
  17. 277
  18. 278
  19. 279
  20. 280

    Information reconciliation through agent controlled graph model. (c2018) حسب Saba, Rita

    منشور في 2018
    "…Even though prevention techniques exist, they’re not enough to fully secure the data from malicious activities. Thus, the need for a detection and recovery algorithm to assess the damage and bring the database back to its consistent state in case of an attack. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis