يعرض 141 - 160 نتائج من 323 نتيجة بحث عن '(( element data algorithm ) OR ((( data processing algorithms ) OR ( end processing algorithm ))))*', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 141

    TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection حسب Zina Chkirbene (16869987)

    منشور في 2020
    "…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …"
  2. 142

    Enhancing Scalability of Fast Electric Vehicle Charging Stations: Solutions for AC–DC Side Integration and Regulation حسب Ali Sharida (17947847)

    منشور في 2024
    "…The proposed solutions focus on streamlining and regulating the connection process for integrating a new active front-end rectifier (AFR) with existing AFRs at the high-voltage dc-link side, without requiring detailed knowledge of their specifications, such as control algorithms, switching frequencies, topologies, and modulation techniques. …"
  3. 143
  4. 144

    Estimation of the methanol loss in the gas hydrate prevention unit using the artificial neural networks: Investigating the effect of training algorithm on the model accuracy حسب Haitao Xu (435549)

    منشور في 2023
    "…Adjusting the weight and bias of the ANN model using an optimization algorithm is known as the training process. The ANN reliability is directly related to the success of the training process. …"
  5. 145

    Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform حسب Hamed Al-Shaibani (19497412)

    منشور في 2022
    "…Moreover, to ensure long-term unlinkability, the process of anonymization is repeated at regular time intervals (every trading session). …"
  6. 146

    Reinforced steering Evolutionary Markov Chain for high-dimensional feature selection حسب Atiq ur Rehman (3044409)

    منشور في 2024
    "…<p>The increasing accessibility of extensive datasets has amplified the importance of extracting insights from high-dimensional data. However, the task of selecting relevant features in these high-dimensional spaces is made more difficult due to the curse of dimensionality. …"
  7. 147

    Large-scale annotation dataset for fetal head biometry in ultrasound images حسب Mahmood Alzubaidi (15740693)

    منشور في 2023
    "…The reliability of the annotations is verified through a two-step validation process involving a Senior Attending Physician and a Radiologic Technologist. …"
  8. 148

    A Hybrid Approach for Predicting Critical Machining Conditions in Titanium Alloy Slot Milling Using Feature Selection and Binary Whale Optimization Algorithm حسب Amirsajjad Rahmani (17541453)

    منشور في 2023
    "…The t-test and the binary whale optimization algorithm (BWOA) were applied to choose the best features and train the support vector machine (SVM) model with validation and training data. …"
  9. 149
  10. 150

    Stochastic management of hybrid AC/DC microgrids considering electric vehicles charging demands حسب Peng, Wang

    منشور في 2020
    "…In order to model the uncertainty effects, a data-driven framework based on point estimate method and support vector machine is developed. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 151
  12. 152
  13. 153
  14. 154
  15. 155

    Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE حسب Mathew, Elezabeth

    منشور في 2020
    "…The data analytics maturity model is used as the conceptual model for evaluating both data analytics and data governance in this research. …"
    احصل على النص الكامل
  16. 156

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method حسب Shahid Rahman (16904613)

    منشور في 2022
    "…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. …"
  17. 157

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts حسب ALSHAMSI, SUROUR

    منشور في 2022
    "…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
    احصل على النص الكامل
  18. 158
  19. 159
  20. 160