Search alternatives:
processing algorithm » processing algorithms (Expand Search)
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
mges algorithm » deer algorithm (Expand Search)
Showing 161 - 180 results of 547 for search '(( elements mges algorithm ) OR ((( data processing algorithm ) OR ( data models algorithm ))))*', query time: 0.12s Refine Results
  1. 161
  2. 162

    Automatic and Intelligent Stressor Identification Based on Photoplethysmography Analysis by Sami Elzeiny (16891521)

    Published 2021
    “…This work leverages the output of wearable technology to provide automatic stress and stressor identification model. In particular, this study proposes a novel algorithm that first detects instances of stress and then classifies the stressor type using photoplethysmography (PPG) data from wearable smartwatches. …”
  3. 163
  4. 164

    Random Forest Bagging and X‐Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data by Rajesh Kumar Dhanaraj (19646269)

    Published 2021
    “…In addition, for grouping similar antipatterns, a clustering process was performed to eradicate the design errors. …”
  5. 165

    Severity-Based Prioritized Processing of Packets with Application in VANETs by Ala Al-Fuqaha (4434340)

    Published 2019
    “…In this study, we propose a generic prioritization and resource management algorithm that can be used to prioritize processing of received packets in vehicular networks. …”
  6. 166
  7. 167

    Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation by Hariprasath Manoharan (14157966)

    Published 2023
    “…Additionally, a clustering algorithm with a fuzzy membership function is implemented, allowing the robots to advance in accordance with predefined clusters and arrive at their starting place within a predetermined amount of time. …”
  8. 168

    Predict Student Success and Performance factors by analyzing educational data using data mining techniques by ATIF, MUHAMMAD

    Published 2022
    “…The model is then applied to data collected from a reputable university that included 126,698 records with twenty-six (26) initial data attributes. …”
    Get full text
  9. 169

    Defining quantitative rules for identifying influential researchers: Insights from mathematics domain by Ghulam Mustafa (458105)

    Published 2024
    “…Within each categorical grouping, we meticulously selected the five most pivotal parameters. This selection process was guided by an importance score, that was derived after assessing its influence on the model's performance in the classification of data pertaining to both awardees and non awardees. …”
  10. 170

    Label dependency modeling in Multi-Label Naïve Bayes through input space expansion by PKA Chitra (21749216)

    Published 2024
    “…To accommodate the heterogeneity of the expanded input space, we refine the likelihood parameters of iMLNB using a joint density function, which is adept at handling the amalgamation of data types. We subject our enhanced iMLNB model to a rigorous empirical evaluation, utilizing six benchmark datasets. …”
  11. 171
  12. 172
  13. 173

    Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation by Fawaz Kserawi (16904859)

    Published 2022
    “…We describe our differentially-private model with flexible constraints and a dynamic window algorithm to maintain the privacy-budget loss in infinitely generated time-series data. …”
  14. 174

    Convergence of Photovoltaic Power Forecasting and Deep Learning: State-of-Art Review by Mohamed Massaoudi (16888710)

    Published 2021
    “…With the massive smart meter integration, DL takes advantage of the large-scale and multi-source data representations to achieve a spectacular performance and high PV forecastability potential compared to classical models. …”
  15. 175

    Oversampling techniques for imbalanced data in regression by Samir Brahim Belhaouari (9427347)

    Published 2024
    “…For tabular data we conducted a comprehensive experiment using various models trained on both augmented and non-augmented datasets, followed by performance comparisons on test data. …”
  16. 176

    Bee Colony Algorithm for Proctors Assignment. by Mansour, Nashat

    Published 2015
    “…The Bee Colony algorithm is a recent population-based search algorithm that mimics the natural behavior of swarms of honey bees during the process of collecting food. …”
    Get full text
    Get full text
    Get full text
    article
  17. 177

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models by Osama Bassam J. Rabie (21323741)

    Published 2024
    “…Moreover, the DBRF classification model is deployed to categorize the normal and attacking data flows using optimized features. …”
  18. 178
  19. 179
  20. 180

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment by Zakaria Tolba (16904718)

    Published 2022
    “…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”