Showing 541 - 560 results of 718 for search '(( element data algorithm ) OR ((( data processing algorithms ) OR ( data using algorithm ))))*', query time: 0.11s Refine Results
  1. 541

    Benchmarking Concept Drift Detectors for Online Machine Learning by Mahgoub, Mahmoud

    Published 2022
    “…The main task is to detect changes in data distribution that might cause changes in the decision bound aries for a classification algorithm. …”
    Get full text
    Get full text
    Get full text
  2. 542

    Clustering Tweets to Discover Trending Topics about دبي (Dubai) by ALYALYALI, SALAMA KHAMIS SALEM KHAMIS

    Published 2018
    “…Then, creating a word vector to the tweets by using TF-IDF methodology. After this, log results into k- mean clustering algorithm with cosine similarity to measure similarity between objects of each cluster. …”
    Get full text
  3. 543

    A novel XML document structure comparison framework based-on sub-tree commonalities and label semantics by Tekli, Joe

    Published 2011
    “…XML similarity evaluation has become a central issue in the database and information communities, its applications ranging over document clustering, version control, data integration and ranked retrieval. Various algorithms for comparing hierarchically structured data, XML documents in particular, have been proposed in the literature. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  4. 544

    The Impact of AI on Decision-Making in Educational Management: Benefits, Risks, and Ethical Concerns by JA’AROUN, WAED YOUSEF

    Published 2024
    “…The integration of artificial intelligence (AI) in educational management is rapidly transforming decision-making processes within schools and institutions. This dissertation explores the impact of AI on decision-making in educational management, focusing on the benefits, risks, and ethical concerns associated with its use. …”
    Get full text
  5. 545

    Decomposition-based wind power forecasting models and their boundary issue: An in-depth review and comprehensive discussion on potential solutions by Yinsong Chen (16685508)

    Published 2022
    “…However, existing studies usually utilize future data during the decomposition process and therefore cannot be appropriately employed for real-world applications, due to the inaccessibility of future data. …”
  6. 546

    A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security by Shitharth Selvarajan (14157976)

    Published 2024
    “…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …”
  7. 547

    AI-Based Methods for Predicting Required Insulin Doses for Diabetic Patients by Azar, Danielle

    Published 2015
    “…The performance of the three algorithms is evaluated on a data set found in the public UCMI repository.…”
    Get full text
    Get full text
    article
  8. 548
  9. 549

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura, Habiba

    Published 2023
    “…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …”
    Get full text
    Get full text
    Get full text
    article
  10. 550

    A new estimator and approach for estimating the subpopulation parameters by Mohammad Salehi M. (21259490)

    Published 2021
    “…The criterion shows that the traditional total subpopulation estimator for unknown subpopulation size will be more efficient if the subpopulation mean is close to zero. Using an innovative procedure, we develop a new estimator, and we study its properties using real data. …”
  11. 551

    A systematic review of recent advances in the application of machine learning in membrane-based gas separation technologies by Farideh Abdollahi (22303153)

    Published 2024
    “…The fingerprinting and descriptors are two commonly approach for polymer featurization. In terms of algorithms, <u>neural networks</u> (NNs), random forest (RF), and gaussian process regression (GPR) are among the most extensively applied methods. …”
  12. 552

    Lagrangian tracking in stochastic fields with application to an ensemble of velocity fields in the Red Sea by Issa, Leila

    Published 2018
    “…Lagrangian tracking of passive tracers in a stochastic velocity field within a sequential ensemble data assimilation framework is challenging due to the exponential growth in the number of particles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  13. 553

    Uplink Noma in UAV-Assisted IoT Networks by Mrad, Ali

    Published 2022
    “…The second device is then selected using a heuristic algorithm based on prioritizing devices with higher bit rate requirements and strict deadlines. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  14. 554

    Starvation Problem in CPU Scheduling for Multimedia Systems by Salah, Khaled

    Published 2002
    “…Multimedia applications have timing requirements that cannot generally be satisfied using the time-sharing algorithms of general-purpose operating systems. …”
    Get full text
    article
  15. 555
  16. 556

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura Habiba (17808302)

    Published 2023
    “…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …”
  17. 557

    NEURAL NETWORK MODEL FOR PLANNED REPLACEMENT OF BOEING 737 BRAKES by Al-Garni, Ahmed Z.

    Published 2020
    “…Three years of data are used for model building and validation. …”
    Get full text
    article
  18. 558

    Anonymizing multimedia documents by Haraty, Ramzi

    Published 2016
    “…In this paper, we propose de-linkability, a privacy-preserving constraint to bound the amount of information outsourced that can be used to re-identify individuals. We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  19. 559
  20. 560

    Framework for rapid design and optimisation of immersive battery cooling system by Ali Almshahy (23544823)

    Published 2025
    “…This study presents a CFD-driven optimisation framework for an immersion cooling BTMS using sustainable palm biodiesel as coolant. The Multi-scale Multi-Domain (NTGK) framework is conducted to effectively capture the complex interactions among various physicochemical processes. …”