Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
Showing 161 - 180 results of 721 for search '(( elements data algorithm ) OR ((( text processing algorithm ) OR ( data using algorithm ))))', query time: 0.12s Refine Results
  1. 161

    Android Malware Detection Using Machine Learning by Al Ali, Shaikha

    Published 2024
    “…Detecting and preventing malware is crucial for several reasons, including the security of personal information, data loss and tampering, system disruptions, financial losses, and reputation damage. …”
    Get full text
    article
  2. 162

    Performance of artificial intelligence models in estimating blood glucose level among diabetic patients using non-invasive wearable device data by Arfan Ahmed (17541309)

    Published 2023
    “…One of the key aspects of WDs with machine learning (ML) algorithms is to find specific data signatures, called Digital biomarkers, that can be used in classification or gaging the extent of the underlying condition. …”
  3. 163

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment by Zakaria Tolba (16904718)

    Published 2022
    “…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
  4. 164

    Fast Text Classification using Lean Gradient Descent Feed Forward Neural Network for Category Feature Augmentation by Attieh, Joseph

    Published 2024
    “…Text classification is a key task of the Natural Language Processing (NLP) field that aims at assigning predefined categories to textual documents. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  5. 165

    Delay Optimization in LoRaWAN by Employing Adaptive Scheduling Algorithm With Unsupervised Learning by Zulfiqar Ali (117651)

    Published 2023
    “…This paper aims to optimize the delay in LoRaWAN by using an Adaptive Scheduling Algorithm (ASA) with an unsupervised probabilistic approach called Gaussian Mixture Model (GMM). …”
  6. 166
  7. 167
  8. 168

    Graph Contraction for Mapping Data on Parallel Computers by Mansour, N.

    Published 1994
    “…We then present experimental results on using contracted graphs as inputs to two physical optimization methods; namely, genetic algorithm and simulated annealing. …”
    Get full text
    Get full text
    Get full text
    article
  9. 169

    Mapping realistic data sets on parallel computers by Mansour, N.

    Published 1993
    “…The GC algorithm allows large-scale mapping to become efficient, especially when slow but high-quality mappers are used.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  10. 170

    Parallel genetic algorithm for disease-gene association by Mansour, Nashat

    Published 2011
    “…In this work, we combine few successful strategies from the literature and present a parallel genetic algorithm for the Tag SNP Selection problem. Our results compared favorably with those of a recognized tag SNP selection algorithm using three different data sets from the HapMap project.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  11. 171
  12. 172

    Particle swarm optimization algorithm: review and applications by Abualigah, Laith

    Published 2024
    “…The main procedure of the PSO algorithm is presented. Future researchers can use the collected data in this survey as baseline information on the PSO and PSO's applications.…”
    Get full text
  13. 173

    New enumeration algorithm for regular boolean functions by Nasrallah, Walid F.

    Published 2018
    “…This algorithm exploits the equivalence between regular Boolean functions and positive threshold functions that can be used to represent instances of the knapsack problem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  14. 174
  15. 175

    Sentiment visualization of correlation of loneliness mapped through social intelligence analysis by Hurmat Ali Shah (18192889)

    Published 2024
    “…By using natural language (NLP) processing, sentiment analysis, and topic modeling, we seek to understand prevalent sentiments and concerns. …”
  16. 176

    The Effects of Data Mining on Small Businesses in Dubai by AlMutawa, Rasha

    Published 2011
    “…While there are numerous studies on the best data mining models and their uses, even on certain industries, this study focuses on the applications more than the algorithms and models and their usefulness for small businesses specifically. …”
    Get full text
  17. 177

    A Hybrid Fault Detection and Diagnosis of Grid-Tied PV Systems: Enhanced Random Forest Classifier Using Data Reduction and Interval-Valued Representation by Khaled Dhibi (16891524)

    Published 2021
    “…The proposed approach deals with system uncertainties (current/voltage variability, noise, measurement errors, ⋯) by using an interval-valued data representation, and with large-scale systems by using a dataset size-reduction framework. …”
  18. 178
  19. 179

    An Effective Hybrid NARX-LSTM Model for Point and Interval PV Power Forecasting by Mohamed Massaoudi (16888710)

    Published 2021
    “…First, the NARXNN model acquires the data to generate a residual error vector. Then, the stacked LSTM model, optimized by Tabu search algorithm, uses the residual error correction associated with the original data to produce a point and interval PVPF. …”
  20. 180

    Intelligent Bilateral Client Selection in Federated Learning Using Game Theory by Wehbi, Osama

    Published 2022
    “…To overcome this problem, we present in this paper FedMint, an intelligent client selection approach for federated learning on IoT devices using game theory and bootstrapping mechanism. Our solution involves designing (1) preference functions for the client IoT devices and federated servers to allow them to rank each other according to several factors such as accuracy and price, (2) intelligent matching algorithms that take into account the preferences of both parties in their design, and (3) bootstrapping technique that capitalizes on the collaboration of multiple federated servers in order to assign initial accuracy value for the new connected IoT devices. …”
    Get full text
    Get full text
    Get full text
    masterThesis