Showing 181 - 200 results of 441 for search '(( elements could algorithm ) OR ((( data code algorithm ) OR ( data modeling algorithm ))))', query time: 0.13s Refine Results
  1. 181
  2. 182

    Degree-Based Network Anonymization by Halawi, Ola

    Published 2020
    “…In this thesis, we study a new multi- objective parameterized anonymization approach that generalizes the known degree anonymization problem and attempts at improving it as a more realistic model for data security/privacy. Our model suggests a convenient privacy level for each net- work based on the standard deviation of its degrees. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  3. 183

    A Hybrid Approach for Predicting Critical Machining Conditions in Titanium Alloy Slot Milling Using Feature Selection and Binary Whale Optimization Algorithm by Amirsajjad Rahmani (17541453)

    Published 2023
    “…The t-test and the binary whale optimization algorithm (BWOA) were applied to choose the best features and train the support vector machine (SVM) model with validation and training data. …”
  4. 184

    Geographical Area Network—Structural Health Monitoring Utility Computing Model by Hasan Tariq (18131842)

    Published 2019
    “…Every gateway is routing the data to SHM-UCM servers running a geo-spatial patch health assessment and prediction algorithm. …”
  5. 185
  6. 186

    Modelling Exchange Rates during Currency Crisis using Neural Networks by Nasr, G. E.

    Published 2006
    “…Exchange rate data from the Lebanese currency crisis period of 1985-1992 is used for training, testing and evaluation of the models. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  7. 187

    Wind, Solar, and Photovoltaic Renewable Energy Systems with and without Energy Storage Optimization: A Survey of Advanced Machine Learning and Deep Learning Techniques by Abu Zitar, Raed

    Published 2022
    “…Nowadays, learning-based modeling methods are utilized to build a precise forecast model for renewable power sources. …”
    Get full text
  8. 188
  9. 189

    A Hybrid Fault Detection and Diagnosis of Grid-Tied PV Systems: Enhanced Random Forest Classifier Using Data Reduction and Interval-Valued Representation by Khaled Dhibi (16891524)

    Published 2021
    “…In the proposed FDD approach, named interval reduced kernel PCA (IRKPCA)-based Random Forest (IRKPCA-RF), the feature extraction and selection phase is performed using the IRKPCA models while the fault classification is ensured using the RF algorithm. …”
  10. 190
  11. 191
  12. 192
  13. 193
  14. 194
  15. 195

    Sentiment Analysis of Dialectal Speech: Unveiling Emotions through Deep Learning Models by EZZELDIN, KHALED MOHAMED KHALED

    Published 2024
    “…Additionally, the GRU-CNN hybrid model attained a notable accuracy of 90%. These findings establish the robustness and effectiveness of hybrid architectures in enhancing emotion recognition accuracy in Arabic speech data, presenting a novel approach for Arabic dialect sentiment analysis.…”
    Get full text
  16. 196

    Investigating the Use of Machine Learning Models to Understand the Drugs Permeability Across Placenta by Vaisali Chandrasekar (16904526)

    Published 2023
    “…Several dataset analysis models are utilised to study the data diversity. Further, this study demonstrates the application of neural network-based models to effectively predict the permeability. …”
  17. 197
  18. 198

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …”
  19. 199

    The use of multi-task learning in cybersecurity applications: a systematic literature review by Shimaa Ibrahim (22155739)

    Published 2024
    “…Cybersecurity has become vital in information technology, with data protection being a major priority. Despite government and corporate efforts, cybersecurity remains a significant concern. …”
  20. 200