بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
data finding » data mining (توسيع البحث), data hiding (توسيع البحث)
element » elements (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
data finding » data mining (توسيع البحث), data hiding (توسيع البحث)
element » elements (توسيع البحث)
-
81
-
82
-
83
-
84
-
85
Degree-Based Network Anonymization
منشور في 2020احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
86
Design of adaptive arrays based on element position perturbations
منشور في 1993"…The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …"
احصل على النص الكامل
احصل على النص الكامل
article -
87
Machine learning based approaches for intelligent adaptation and prediction in banking business processes. (c2018)
منشور في 2018"…Companies, nowadays, rely on systems and applications to automate their business processes and data management. In this context, the notion of integrating machine learning techniques in banking business processes has emerged, where trainable computational algorithms can be improved by learning. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
88
Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE
منشور في 2020"…The hospitality industry is growing at an increasingly fast pace across the world which results in accumulating a large amount of data, including employee details, property details, purchase details, vendor details, and so on. …"
احصل على النص الكامل
-
89
Topics in graph algorithms
منشور في 2003"…This is achieved by implementing some algorithms for the vertex cover problem, and conducting experiments on real data sets. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
90
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
منشور في 2022"…Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …"
-
91
-
92
Distributed Tree-Based Machine Learning for Short-Term Load Forecasting With Apache Spark
منشور في 2021"…The paper proposes a concurrent job scheduling algorithm in a multi-energy data source environment using Apache Spark. …"
-
93
-
94
Information warfare recovery-fighting back through the matrix. (c2012)
منشور في 2012احصل على النص الكامل
احصل على النص الكامل
masterThesis -
95
-
96
-
97
C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments
منشور في 2023"…The aim of streaming conformance checking is to find dis crepancies between process executions on streaming data and the refer ence process model. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
98
-
99
Data Generation for Path Testing
منشور في 2004احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
100