بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
data finding » data mining (توسيع البحث), data hiding (توسيع البحث)
element » elements (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
data finding » data mining (توسيع البحث), data hiding (توسيع البحث)
element » elements (توسيع البحث)
-
41
Mining airline data for CRM strategies. (c2006)
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
masterThesis -
42
Nonlinear analysis of shell structures using image processing and machine learning
منشور في 2023"…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …"
-
43
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
منشور في 2022"…We present the new framework for the detection of cyberattacks, which makes use of AI and ML. We begin a process to cleaning up the data in the CPS database by applying normalization to eliminate errors and duplication. …"
احصل على النص الكامل
احصل على النص الكامل
-
44
A flexible genetic algorithm-fuzzy regression approach for forecasting: The case of bitumen consumption
منشور في 2019"…Findings Production, import, export, road construction and price are considered as the input data used in the present study. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
45
Software defect prediction. (c2019)
منشور في 2019احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
46
-
47
-
48
-
49
-
50
A reduced model for phase-change problems with radiation using simplified PN approximations
منشور في 2025"…The integro-differential equation for the full radiative transfer is replaced by a set of differential equations which are independent of the angle variable and easy to solve using conventional computational methods. To solve the coupled equations, we implement a second-order implicit scheme for the time integration and a mixed finite element method for the space discretization. …"
احصل على النص الكامل
article -
51
-
52
-
53
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
منشور في 2007"…To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
54
-
55
Efficient Approximate Conformance Checking Using Trie Data Structures
منشور في 2021"…Conformance checking compares a process model and recorded executions of a process, i.e., a log of traces. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
56
Brain Source Localization in the Presence of Leadfield Perturbations
منشور في 2015احصل على النص الكامل
doctoralThesis -
57
Sentiment analysis for Arabizi in social media. (c2015)
منشور في 2015"…Yalla 7abibi, it is very useful to have a data mining tool that can analyze the sentiment of Twitter users in the Arab world. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
58
-
59
Extended Behavioral Modeling of FET and Lattice-Mismatched HEMT Devices
منشور في 2016الموضوعات: احصل على النص الكامل
doctoralThesis -
60