Showing 61 - 80 results of 124 for search '(( element network algorithm ) OR ((( data code algorithm ) OR ( data mining algorithm ))))', query time: 0.12s Refine Results
  1. 61
  2. 62
  3. 63
  4. 64

    Recent Advances of Chimp Optimization Algorithm: Variants and Applications by Daoud, Mohammad Sh.

    Published 2023
    “…The review paper will be helpful for the researchers and practitioners of ChOA belonging to a wide range of audiences from the domains of optimization, engineering, medical, data mining, and clustering. As well, it is wealthy in research on health, environment, and public safety. …”
    Get full text
  5. 65

    Fuzzy simulated evolution algorithm for topology design of campusnetworks by Youssef, H.

    Published 2000
    “…We present an approach based on the simulated evolution algorithm for the design of campus network topology. …”
    Get full text
    Get full text
    article
  6. 66

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach by Sarif, Bambang

    Published 2006
    “…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …”
    Get full text
    Get full text
    article
  7. 67
  8. 68
  9. 69

    Predictive Model of Psychoactive Drugs Consumption using Classification Machine Learning Algorithms by Almahmood, Mothanna

    Published 2023
    “…Our study aimed to use data mining classification techniques, in order to classify the individual into two categories: user or non-user. …”
    Get full text
  10. 70
  11. 71

    A Data-Driven Decision-Making Framework for Fleet Management in the Government Sector of Dubai by ALGHANEM, HANI SUBHI MOHD

    Published 2024
    “…The proposed framework comprises key elements: Important Decisions derived from interviews with transportation leaders, Knowledge Management enhanced by AI algorithms, Data Mining/Analysis utilizing historical data, the Fleet Management System employing Oracle ERP, and a Data-Driven Decision Support Framework that leans towards the extended framework approach. …”
    Get full text
  12. 72

    Joint energy-distortion aware algorithms for cooperative video streaming over LTE networks by Yaacoub, Elias

    Published 2013
    “…Videos with single description coding (SDC), multiple description coding (MDC), and scalable video coding (SVC) are considered. …”
    Get full text
    Get full text
    Get full text
    article
  13. 73

    Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators by Abu Zitar, Raed

    Published 2021
    “…The outcomes of the DNA microarray is a table/matrix, called gene expression data. Pattern recognition algorithms are widely applied to gene expression data to differentiate between health and cancerous patient samples. …”
    Get full text
  14. 74

    Molecular Classification of Breast Cancer Utilizing Long Non-Coding RNA (lncRNA) Transcriptomes Identifies Novel Diagnostic lncRNA Panel for Triple-Negative Breast Cancer by Hibah Shaath (5599658)

    Published 2021
    “…The identification of long non-coding RNAs (lncRNAs) and the roles they play in cancer progression has recently proven to be beneficial. …”
  15. 75
  16. 76

    Gradient-Based Optimizer (GBO): A Review, Theory, Variants, and Applications by Daoud, Mohammad Sh.

    Published 2023
    “…The review paper will be helpful for the researchers and practitioners of GBO belonging to a wide range of audiences from the domains of optimization, engineering, medical, data mining and clustering. As well, it is wealthy in research on health, environment and public safety. …”
    Get full text
  17. 77

    Practical Multiple Node Failure Recovery in Distributed Storage Systems by Itani, M.

    Published 2016
    “…The fractional repetition (FR) code is a class of regenerating codes that consists of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  18. 78

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …”
  19. 79

    Simple and effective neural-free soft-cluster embeddings for item cold-start recommendations by Shameem A. Puthiya Parambath (14150997)

    Published 2022
    “…CIP can be used in conjunction with relevance ranking metrics like NDCG and MAP to measure the effectiveness of the cold-start recommendation algorithm.</p><h2>Other Information</h2> <p> Published in: Data Mining and Knowledge Discovery<br> License: <a href="https://creativecommons.org/licenses/by/4.0" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="http://dx.doi.org/10.1007/s10618-020-00708-6" target="_blank">http://dx.doi.org/10.1007/s10618-020-00708-6</a></p>…”
  20. 80