Search alternatives:
processing algorithm » processing algorithms (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
data modeling » data models (Expand Search), spatial modeling (Expand Search)
processing algorithm » processing algorithms (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
data modeling » data models (Expand Search), spatial modeling (Expand Search)
-
101
A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks
Published 2022“…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …”
-
102
-
103
-
104
-
105
Estimation of the methanol loss in the gas hydrate prevention unit using the artificial neural networks: Investigating the effect of training algorithm on the model accuracy
Published 2023“…Adjusting the weight and bias of the ANN model using an optimization algorithm is known as the training process. …”
-
106
Scatter search for protein structure prediction. (c2008)
Published 2008Get full text
Get full text
masterThesis -
107
Performance of artificial intelligence models in estimating blood glucose level among diabetic patients using non-invasive wearable device data
Published 2023“…Our experimental design included Data Collection, Feature Engineering, ML model selection/development, and reporting evaluation of metrics.…”
-
108
Predict Student Success and Performance factors by analyzing educational data using data mining techniques
Published 2022“…The model is then applied to data collected from a reputable university that included 126,698 records with twenty-six (26) initial data attributes. …”
Get full text
-
109
-
110
A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining
Published 2021“…Second, an up-to-date overview of the IoT cybersecurity standards landscape has been mapped by combining existing overviews. Third, a text mining algorithm has been implemented. Fourth, the systematic approach has been modeled using business process modeling notation. …”
-
111
Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation
Published 2022“…We describe our differentially-private model with flexible constraints and a dynamic window algorithm to maintain the privacy-budget loss in infinitely generated time-series data. …”
-
112
Oversampling techniques for imbalanced data in regression
Published 2024“…For tabular data we conducted a comprehensive experiment using various models trained on both augmented and non-augmented datasets, followed by performance comparisons on test data. …”
-
113
Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE
Published 2018“…We examined different feature selection methods and classification algorithms to find the best prediction model with the highest accuracy. …”
Get full text
-
114
-
115
Fast Text Classification using Lean Gradient Descent Feed Forward Neural Network for Category Feature Augmentation
Published 2024“…Text classification is a key task of the Natural Language Processing (NLP) field that aims at assigning predefined categories to textual documents. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
116
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
Published 2022“…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
-
117
A kernelization algorithm for d-Hitting Set
Published 2010“…For 3-Hitting Set, an arbitrary instance is reduced into an equivalent one that contains at most 5k2+k elements. This kernelization is an improvement over previously known methods that guarantee cubic-order kernels. …”
Get full text
Get full text
Get full text
article -
118
Interval-Valued SVM Based ABO for Fault Detection and Diagnosis of Wind Energy Conversion Systems
Published 2022Subjects: -
119
-
120