Search alternatives:
method algorithm » mould algorithm (Expand Search)
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
finding » findings (Expand Search)
method algorithm » mould algorithm (Expand Search)
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
finding » findings (Expand Search)
-
101
Developing a UAE-Based Disputes Prediction Model using Machine Learning
Published 2022Get full text
doctoralThesis -
102
-
103
Interval-Valued SVM Based ABO for Fault Detection and Diagnosis of Wind Energy Conversion Systems
Published 2022Subjects: -
104
A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks
Published 2022“…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …”
-
105
-
106
-
107
Estimation of the methanol loss in the gas hydrate prevention unit using the artificial neural networks: Investigating the effect of training algorithm on the model accuracy
Published 2023“…Adjusting the weight and bias of the ANN model using an optimization algorithm is known as the training process. …”
-
108
-
109
Predict Student Success and Performance factors by analyzing educational data using data mining techniques
Published 2022“…The model is then applied to data collected from a reputable university that included 126,698 records with twenty-six (26) initial data attributes. …”
Get full text
-
110
Label dependency modeling in Multi-Label Naïve Bayes through input space expansion
Published 2024“…To accommodate the heterogeneity of the expanded input space, we refine the likelihood parameters of iMLNB using a joint density function, which is adept at handling the amalgamation of data types. We subject our enhanced iMLNB model to a rigorous empirical evaluation, utilizing six benchmark datasets. …”
-
111
-
112
Evolutionary Algorithms for VLSIMultiobjective Netlist Partitioning
Published 2006“…In this paper, we engineer three iterative heuristics for the optimization of VLSI netlist bi-Partitioning. These heuristics are based on Genetic Algorithms (GAs), Tabu Search (TS) and Simulated Evolution (SimE). …”
Get full text
article -
113
Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation
Published 2022“…We describe our differentially-private model with flexible constraints and a dynamic window algorithm to maintain the privacy-budget loss in infinitely generated time-series data. …”
-
114
Convergence of Photovoltaic Power Forecasting and Deep Learning: State-of-Art Review
Published 2021“…With the massive smart meter integration, DL takes advantage of the large-scale and multi-source data representations to achieve a spectacular performance and high PV forecastability potential compared to classical models. …”
-
115
Oversampling techniques for imbalanced data in regression
Published 2024“…For tabular data we conducted a comprehensive experiment using various models trained on both augmented and non-augmented datasets, followed by performance comparisons on test data. …”
-
116
Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE
Published 2018“…We examined different feature selection methods and classification algorithms to find the best prediction model with the highest accuracy. …”
Get full text
-
117
Bee Colony Algorithm for Proctors Assignment.
Published 2015“…This problem is intractable, and hence, heuristics algorithms are needed to find good solutions. In this paper, we propose a new solution for the proctor assignment problem based on the Bee Colony meta-heuristic algorithm. …”
Get full text
Get full text
Get full text
article -
118
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…Moreover, the DBRF classification model is deployed to categorize the normal and attacking data flows using optimized features. …”
-
119
-
120
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
Published 2022“…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”