بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
ipca algorithm » jaya algorithm (توسيع البحث)
يعرض 81 - 100 نتائج من 377 نتيجة بحث عن '(( elements ipca algorithm ) OR ((( data processing algorithm ) OR ( data existing algorithm ))))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 81

    Severity-Based Prioritized Processing of Packets with Application in VANETs حسب Ala Al-Fuqaha (4434340)

    منشور في 2019
    "…In this study, we propose a generic prioritization and resource management algorithm that can be used to prioritize processing of received packets in vehicular networks. …"
  2. 82

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches حسب Natasha Akram (20749538)

    منشور في 2024
    "…Hence, we extend it with the latest job postings. Exploratory Data Analysis (EDA) highlights the class imbalance problem in detecting fake jobs, which tends the model to act aggressively toward the minority class. …"
  3. 83

    A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems حسب Faria Nawshin (21841598)

    منشور في 2025
    "…<p dir="ltr">Federated Learning (FL) is gaining traction in Android-based consumer electronics, enabling collaborative model training across decentralized devices while preserving data privacy. However, the increasing adoption of FL in these devices exposes them to adversarial attacks that can compromise user data and device security. …"
  4. 84

    Bee Colony Algorithm for Proctors Assignment. حسب Mansour, Nashat

    منشور في 2015
    "…The Bee Colony algorithm is a recent population-based search algorithm that mimics the natural behavior of swarms of honey bees during the process of collecting food. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 85

    Multi-Cluster Jumping Particle Swarm Optimization for Fast Convergence حسب Atiq Ur Rehman (8843024)

    منشور في 2020
    "…Keeping in view the need of an optimization algorithm with fast convergence speed, suitable for high dimensional data space, this article proposes a novel concept of Multi-Cluster Jumping PSO. …"
  6. 86

    Data Redundancy Management in Connected Environments حسب Mansour, Elio

    منشور في 2020
    "…In this work, we focus on managing sensor data redundancies in connected environments. Existing works often suffer from (i) disregarding either network core or edge device redundancies; (ii) disregarding the limited capabilities of edge devices; and (iii) disregarding sensors mobility and the dynamicity of the network. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  7. 87

    Unsupervised outlier detection in multidimensional data حسب Atiq ur Rehman (14153391)

    منشور في 2022
    "…<p>Detection and removal of outliers in a dataset is a fundamental preprocessing task without which the analysis of the data can be misleading. Furthermore, the existence of anomalies in the data can heavily degrade the performance of machine learning algorithms. …"
  8. 88
  9. 89
  10. 90

    Process Mining over Unordered Event Streams حسب Awad, Ahmed

    منشور في 2020
    "…This requires online algorithms that, instead of keeping the whole history of event data, work incrementally and update analysis results upon the arrival of new events. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  11. 91
  12. 92

    Nonlinear analysis of shell structures using image processing and machine learning حسب M.S. Nashed (16392961)

    منشور في 2023
    "…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …"
  13. 93

    The Effects of Data Mining on Small Businesses in Dubai حسب AlMutawa, Rasha

    منشور في 2011
    "…While there are numerous studies on the best data mining models and their uses, even on certain industries, this study focuses on the applications more than the algorithms and models and their usefulness for small businesses specifically. …"
    احصل على النص الكامل
  14. 94

    Spider monkey optimizations: application review and results حسب Abualigah, Laith

    منشور في 2024
    "…Optimization algorithms are applied to find efficient solutions in different problems in several fields such as the routing in wireless networks, cloud computing, big data, image processing and scheduling, and so forth. …"
    احصل على النص الكامل
  15. 95

    Sentiment visualization of correlation of loneliness mapped through social intelligence analysis حسب Hurmat Ali Shah (18192889)

    منشور في 2024
    "…Social media platforms have become a valuable source of data to study this phenomenon.</p><h3>Objectives</h3><p dir="ltr">This paper aims to visualize the frequency of loneliness-related themes and topics in Twitter data. …"
  16. 96
  17. 97

    An Effective Hybrid NARX-LSTM Model for Point and Interval PV Power Forecasting حسب Mohamed Massaoudi (16888710)

    منشور في 2021
    "…First, the NARXNN model acquires the data to generate a residual error vector. Then, the stacked LSTM model, optimized by Tabu search algorithm, uses the residual error correction associated with the original data to produce a point and interval PVPF. …"
  18. 98
  19. 99

    Recent Advances of Chimp Optimization Algorithm: Variants and Applications حسب Daoud, Mohammad Sh.

    منشور في 2023
    "…Chimp Optimization Algorithm (ChOA) is one of the recent metaheuristics swarm intelligence methods. …"
    احصل على النص الكامل
  20. 100

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts حسب ALSHAMSI, SUROUR

    منشور في 2022
    "…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
    احصل على النص الكامل