بدائل البحث:
models algorithm » mould algorithm (توسيع البحث), deer algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
element » elements (توسيع البحث)
defined » designed (توسيع البحث)
models algorithm » mould algorithm (توسيع البحث), deer algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
element » elements (توسيع البحث)
defined » designed (توسيع البحث)
-
81
-
82
Estimation of the methanol loss in the gas hydrate prevention unit using the artificial neural networks: Investigating the effect of training algorithm on the model accuracy
منشور في 2023"…Adjusting the weight and bias of the ANN model using an optimization algorithm is known as the training process. …"
-
83
BUC algorithm for iceberg cubes
منشور في 2003"…The Uniform distribution is used as a basis for comparison. Results show that when the cube is sparse there is a correlation between the data distribution and the running time of the algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
84
-
85
Predict Student Success and Performance factors by analyzing educational data using data mining techniques
منشور في 2022"…The model is then applied to data collected from a reputable university that included 126,698 records with twenty-six (26) initial data attributes. …"
احصل على النص الكامل
-
86
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
منشور في 2024"…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …"
-
87
-
88
Optimum sensors allocation for drones multi-target tracking under complex environment using improved prairie dog optimization
منشور في 2024"…Environment and conditions are assumed to be similar in future drone flights within the radars’ defined zone. The IPDOA performance was compared with the other 8 metaheuristic optimization algorithms and the testing showed its superiority over those techniques for solving this complex problem. …"
احصل على النص الكامل
-
89
Label dependency modeling in Multi-Label Naïve Bayes through input space expansion
منشور في 2024"…To accommodate the heterogeneity of the expanded input space, we refine the likelihood parameters of iMLNB using a joint density function, which is adept at handling the amalgamation of data types. We subject our enhanced iMLNB model to a rigorous empirical evaluation, utilizing six benchmark datasets. …"
-
90
-
91
Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation
منشور في 2022"…We describe our differentially-private model with flexible constraints and a dynamic window algorithm to maintain the privacy-budget loss in infinitely generated time-series data. …"
-
92
Convergence of Photovoltaic Power Forecasting and Deep Learning: State-of-Art Review
منشور في 2021"…With the massive smart meter integration, DL takes advantage of the large-scale and multi-source data representations to achieve a spectacular performance and high PV forecastability potential compared to classical models. …"
-
93
Oversampling techniques for imbalanced data in regression
منشور في 2024"…For tabular data we conducted a comprehensive experiment using various models trained on both augmented and non-augmented datasets, followed by performance comparisons on test data. …"
-
94
Evolutionary algorithm for protein structure prediction
منشور في 2010احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
95
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
منشور في 2024"…Moreover, the DBRF classification model is deployed to categorize the normal and attacking data flows using optimized features. …"
-
96
Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE
منشور في 2018"…We examined different feature selection methods and classification algorithms to find the best prediction model with the highest accuracy. …"
احصل على النص الكامل
-
97
-
98
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
منشور في 2022"…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …"
-
99
-
100
The Effects of Data Mining on Small Businesses in Dubai
منشور في 2011"…While there are numerous studies on the best data mining models and their uses, even on certain industries, this study focuses on the applications more than the algorithms and models and their usefulness for small businesses specifically. …"
احصل على النص الكامل