بدائل البحث:
encoding algorithm » cosine algorithm (توسيع البحث)
means algorithm » search algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
يعرض 101 - 120 نتائج من 692 نتيجة بحث عن '(( elements means algorithm ) OR ((( data encoding algorithm ) OR ( data using algorithm ))))', وقت الاستعلام: 0.15s تنقيح النتائج
  1. 101
  2. 102
  3. 103
  4. 104
  5. 105

    Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE حسب SHWEDEH, FATEN

    منشور في 2018
    "…Classification is a Data Mining (DM) technique used for prediction. On the other hand, feature selection is the process of finding the best set of features that has the most impact on a specific target. …"
    احصل على النص الكامل
  6. 106
  7. 107
  8. 108

    Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques حسب Ameema Zainab (16864263)

    منشور في 2020
    "…The obtained results illustrate the efficacy of the proposed algorithm to analyze the time series data from the IoT devices for spam detection.…"
  9. 109

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method حسب Amit Kumar Balyan (18288964)

    منشور في 2022
    "…To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …"
  10. 110
  11. 111
  12. 112
  13. 113

    BUC algorithm for iceberg cubes حسب Nasr, George E.

    منشور في 2003
    "…The Uniform distribution is used as a basis for comparison. Results show that when the cube is sparse there is a correlation between the data distribution and the running time of the algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  14. 114
  15. 115
  16. 116
  17. 117

    The use of multi-task learning in cybersecurity applications: a systematic literature review حسب Shimaa Ibrahim (22155739)

    منشور في 2024
    "…Five critical applications, such as network intrusion detection and malware detection, were identified, and several tasks used in these applications were observed. Most of the studies used supervised learning algorithms, and there were very limited studies that focused on other types of machine learning. …"
  18. 118

    Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT حسب Arumugam K (18456690)

    منشور في 2021
    "…This paper proposes an Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT. …"
  19. 119
  20. 120

    A Novel Big Data Classification Technique for Healthcare Application Using Support Vector Machine, Random Forest and J48 حسب Al-Manaseer, Hitham

    منشور في 2022
    "…The performance of the algorithms for accuracy was evaluated using the Healthcare (heart attack possibility) dataset, freely available on kagle. …"
    احصل على النص الكامل