يعرض 141 - 160 نتائج من 888 نتيجة بحث عن '(( elements deer algorithm ) OR ((( based solution algorithm ) OR ( data using algorithm ))))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 141
  2. 142
  3. 143
  4. 144

    Distributed DRL-Based Downlink Power Allocation for Hybrid RF/VLC Networks حسب Bekir Sait Ciftler (17541801)

    منشور في 2021
    "…Additionally, we quantify the performance of the DDPG-based algorithm to prevail amid DRL-based algorithms at the expense of higher implementation complexity.…"
  5. 145

    Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE حسب SHWEDEH, FATEN

    منشور في 2018
    "…Classification is a Data Mining (DM) technique used for prediction. On the other hand, feature selection is the process of finding the best set of features that has the most impact on a specific target. …"
    احصل على النص الكامل
  6. 146
  7. 147

    Data Generation for Path Testing حسب Mansour, Nashat

    منشور في 2004
    "…These algorithms are based on an optimization formulation of the path testing problem which include both integer- and real-value test cases. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 148

    A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks حسب Umesh Kumar Lilhore (17727684)

    منشور في 2022
    "…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …"
  9. 149

    Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques حسب Ameema Zainab (16864263)

    منشور في 2020
    "…The obtained results illustrate the efficacy of the proposed algorithm to analyze the time series data from the IoT devices for spam detection.…"
  10. 150
  11. 151
  12. 152
  13. 153

    BUC algorithm for iceberg cubes حسب Nasr, George E.

    منشور في 2003
    "…The Uniform distribution is used as a basis for comparison. Results show that when the cube is sparse there is a correlation between the data distribution and the running time of the algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  14. 154
  15. 155
  16. 156
  17. 157

    The use of multi-task learning in cybersecurity applications: a systematic literature review حسب Shimaa Ibrahim (22155739)

    منشور في 2024
    "…Five critical applications, such as network intrusion detection and malware detection, were identified, and several tasks used in these applications were observed. Most of the studies used supervised learning algorithms, and there were very limited studies that focused on other types of machine learning. …"
  18. 158

    A Novel Big Data Classification Technique for Healthcare Application Using Support Vector Machine, Random Forest and J48 حسب Al-Manaseer, Hitham

    منشور في 2022
    "…The performance of the algorithms for accuracy was evaluated using the Healthcare (heart attack possibility) dataset, freely available on kagle. …"
    احصل على النص الكامل
  19. 159

    QU-GM: An IoT Based Glucose Monitoring System From Photoplethysmography, Blood Pressure, and Demographic Data Using Machine Learning حسب Md Nazmul Islam Shuzan (21842426)

    منشور في 2024
    "…We collected PPG signals, demographic information, and blood pressure data from 139 diabetic (49.65%) and non-diabetic (50.35%) subjects. …"
  20. 160