Search alternatives:
processing algorithm » processing algorithms (Expand Search)
working algorithms » learning algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
Showing 121 - 140 results of 461 for search '(( elements method algorithm ) OR ((( data working algorithms ) OR ( data processing algorithm ))))', query time: 0.15s Refine Results
  1. 121
  2. 122

    Predict Student Success and Performance factors by analyzing educational data using data mining techniques by ATIF, MUHAMMAD

    Published 2022
    “…The model is then applied to data collected from a reputable university that included 126,698 records with twenty-six (26) initial data attributes. …”
    Get full text
  3. 123
  4. 124

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches by Natasha Akram (20749538)

    Published 2024
    “…Hence, we extend it with the latest job postings. Exploratory Data Analysis (EDA) highlights the class imbalance problem in detecting fake jobs, which tends the model to act aggressively toward the minority class. …”
  5. 125

    Stochastic Search Algorithms for Exam Scheduling by Mansour, Nashat

    Published 2007
    “…Then, we empirically compare the three proposed algorithms and FESP using realistic data. Our experimental results show that SA and GA produce good exam schedules that are better than those of FESP heuristic procedure. …”
    Get full text
    Get full text
    article
  6. 126

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
    Get full text
  7. 127

    Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation by Fawaz Kserawi (16904859)

    Published 2022
    “…A significant body of work in the literature employs differential privacy methods with constraining predefined parameters to achieve the optimal trade-off between privacy and utility of the data. …”
  8. 128

    Bee Colony Algorithm for Proctors Assignment. by Mansour, Nashat

    Published 2015
    “…The Bee Colony algorithm is a recent population-based search algorithm that mimics the natural behavior of swarms of honey bees during the process of collecting food. …”
    Get full text
    Get full text
    Get full text
    article
  9. 129

    Data Redundancy Management in Connected Environments by Mansour, Elio

    Published 2020
    “…In this work, we focus on managing sensor data redundancies in connected environments. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  10. 130

    Process Mining over Unordered Event Streams by Awad, Ahmed

    Published 2020
    “…This requires online algorithms that, instead of keeping the whole history of event data, work incrementally and update analysis results upon the arrival of new events. …”
    Get full text
    Get full text
    Get full text
  11. 131
  12. 132

    A kernelization algorithm for d-Hitting Set by Abu-Khzam, Faisal N.

    Published 2010
    “…For 3-Hitting Set, an arbitrary instance is reduced into an equivalent one that contains at most 5k2+k elements. This kernelization is an improvement over previously known methods that guarantee cubic-order kernels. …”
    Get full text
    Get full text
    Get full text
    article
  13. 133
  14. 134
  15. 135
  16. 136

    Parallel genetic algorithm for disease-gene association by Mansour, Nashat

    Published 2011
    “…Our results compared favorably with those of a recognized tag SNP selection algorithm using three different data sets from the HapMap project.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  17. 137

    Sentiment visualization of correlation of loneliness mapped through social intelligence analysis by Hurmat Ali Shah (18192889)

    Published 2024
    “…Social media platforms have become a valuable source of data to study this phenomenon.</p><h3>Objectives</h3><p dir="ltr">This paper aims to visualize the frequency of loneliness-related themes and topics in Twitter data. …”
  18. 138

    Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements by Stefano Nardean (14151900)

    Published 2023
    “…<p dir="ltr">This work proposes an original preconditioner that couples the Constrained Pressure Residual (CPR) method with block preconditioning for the efficient solution of the linearized systems of equations arising from fully implicit multiphase flow models. …”
  19. 139
  20. 140

    Prediction of EV Charging Behavior Using Machine Learning by Shahriar, Sakib

    Published 2021
    “…Using data-driven tools and machine learning algorithms to learn the EV charging behavior can improve scheduling algorithms. …”
    Get full text
    article