Search alternatives:
processing algorithm » processing algorithms (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
data modeling » data models (Expand Search), spatial modeling (Expand Search)
Showing 101 - 120 results of 496 for search '(( elements method algorithm ) OR ((( data modeling algorithm ) OR ( text processing algorithm ))))', query time: 0.15s Refine Results
  1. 101

    A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks by Umesh Kumar Lilhore (17727684)

    Published 2022
    “…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …”
  2. 102
  3. 103
  4. 104
  5. 105

    Estimation of the methanol loss in the gas hydrate prevention unit using the artificial neural networks: Investigating the effect of training algorithm on the model accuracy by Haitao Xu (435549)

    Published 2023
    “…Adjusting the weight and bias of the ANN model using an optimization algorithm is known as the training process. …”
  6. 106
  7. 107

    Performance of artificial intelligence models in estimating blood glucose level among diabetic patients using non-invasive wearable device data by Arfan Ahmed (17541309)

    Published 2023
    “…Our experimental design included Data Collection, Feature Engineering, ML model selection/development, and reporting evaluation of metrics.…”
  8. 108

    Predict Student Success and Performance factors by analyzing educational data using data mining techniques by ATIF, MUHAMMAD

    Published 2022
    “…The model is then applied to data collected from a reputable university that included 126,698 records with twenty-six (26) initial data attributes. …”
    Get full text
  9. 109
  10. 110

    A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining by Koen Schaaf (14778139)

    Published 2021
    “…Second, an up-to-date overview of the IoT cybersecurity standards landscape has been mapped by combining existing overviews. Third, a text mining algorithm has been implemented. Fourth, the systematic approach has been modeled using business process modeling notation. …”
  11. 111

    Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation by Fawaz Kserawi (16904859)

    Published 2022
    “…We describe our differentially-private model with flexible constraints and a dynamic window algorithm to maintain the privacy-budget loss in infinitely generated time-series data. …”
  12. 112

    Oversampling techniques for imbalanced data in regression by Samir Brahim Belhaouari (9427347)

    Published 2024
    “…For tabular data we conducted a comprehensive experiment using various models trained on both augmented and non-augmented datasets, followed by performance comparisons on test data. …”
  13. 113

    Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE by SHWEDEH, FATEN

    Published 2018
    “…We examined different feature selection methods and classification algorithms to find the best prediction model with the highest accuracy. …”
    Get full text
  14. 114
  15. 115

    Fast Text Classification using Lean Gradient Descent Feed Forward Neural Network for Category Feature Augmentation by Attieh, Joseph

    Published 2024
    “…Text classification is a key task of the Natural Language Processing (NLP) field that aims at assigning predefined categories to textual documents. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  16. 116

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment by Zakaria Tolba (16904718)

    Published 2022
    “…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
  17. 117

    A kernelization algorithm for d-Hitting Set by Abu-Khzam, Faisal N.

    Published 2010
    “…For 3-Hitting Set, an arbitrary instance is reduced into an equivalent one that contains at most 5k2+k elements. This kernelization is an improvement over previously known methods that guarantee cubic-order kernels. …”
    Get full text
    Get full text
    Get full text
    article
  18. 118
  19. 119
  20. 120