بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
solved making » mold making (توسيع البحث)
element » elements (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
solved making » mold making (توسيع البحث)
element » elements (توسيع البحث)
-
121
BUC algorithm for iceberg cubes
منشور في 2003"…The Uniform distribution is used as a basis for comparison. Results show that when the cube is sparse there is a correlation between the data distribution and the running time of the algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
122
An enhanced quorum selection algorithm
منشور في 2009احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
123
An Improved Quorum Selection Algorithm
منشور في 2008احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
124
Use data Mining Techniques to Predict Users’ Engagement on the Social Network Posts in The Period Before, During and After Ramadan
منشور في 2017"…Different classification algorithms were applied to the dataset using the Rapidminer tool. …"
احصل على النص الكامل
-
125
The use of multi-task learning in cybersecurity applications: a systematic literature review
منشور في 2024"…Five critical applications, such as network intrusion detection and malware detection, were identified, and several tasks used in these applications were observed. Most of the studies used supervised learning algorithms, and there were very limited studies that focused on other types of machine learning. …"
-
126
Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT
منشور في 2021"…This paper proposes an Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT. …"
-
127
-
128
A Novel Big Data Classification Technique for Healthcare Application Using Support Vector Machine, Random Forest and J48
منشور في 2022"…The performance of the algorithms for accuracy was evaluated using the Healthcare (heart attack possibility) dataset, freely available on kagle. …"
احصل على النص الكامل
-
129
Correlation Clustering with Overlaps
منشور في 2020"…In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
130
QU-GM: An IoT Based Glucose Monitoring System From Photoplethysmography, Blood Pressure, and Demographic Data Using Machine Learning
منشور في 2024"…We collected PPG signals, demographic information, and blood pressure data from 139 diabetic (49.65%) and non-diabetic (50.35%) subjects. …"
-
131
A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems
منشور في 2025"…<p dir="ltr">Federated Learning (FL) is gaining traction in Android-based consumer electronics, enabling collaborative model training across decentralized devices while preserving data privacy. However, the increasing adoption of FL in these devices exposes them to adversarial attacks that can compromise user data and device security. …"
-
132
Predicting Plasma Vitamin C Using Machine Learning
منشور في 2022"…The objective of this study is to predict plasma vitamin C using machine learning. The NHANES dataset was used to predict plasma vitamin C in a cohort of 2952 American adults using regression algorithms and clustering in a way that a hypothetical health application might. …"
-
133
Stochastic Search Algorithms for Exam Scheduling
منشور في 2007"…Then, we empirically compare the three proposed algorithms and FESP using realistic data. Our experimental results show that SA and GA produce good exam schedules that are better than those of FESP heuristic procedure. …"
احصل على النص الكامل
احصل على النص الكامل
article -
134
-
135
Robust Control Of Sampled Data Systems
منشور في 2020"…They then present a numerical controller design algorithm based on the derived bounds. Examples are used for demonstration.…"
احصل على النص الكامل
article -
136
Robust Control Of Sampled Data Systems
منشور في 2020"…They then present a numerical controller design algorithm based on the derived bounds. Examples are used for demonstration.…"
احصل على النص الكامل
article -
137
Robust Control Of Sampled Data Systems
منشور في 2020"…They then present a numerical controller design algorithm based on the derived bounds.Examples are used for demonstration.…"
احصل على النص الكامل
article -
138
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
منشور في 2024"…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …"
-
139
Oversampling techniques for imbalanced data in regression
منشور في 2024"…For tabular data we conducted a comprehensive experiment using various models trained on both augmented and non-augmented datasets, followed by performance comparisons on test data. …"
-
140