يعرض 21 - 40 نتائج من 710 نتيجة بحث عن '(( elements mold algorithm ) OR ((( data using algorithm ) OR ( data testing algorithm ))))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 21
  2. 22

    Cryptocurrency Exchange Market Prediction and Analysis Using Data Mining and Artificial Intelligence حسب Al Rayhi, Nasser

    منشور في 2020
    "…One of the best algorithms in terms of the result is the Long Short Term Memory (LSTM) since it is based on recurrent neural networks which uses loop as a method to learn from heuristics data. …"
    احصل على النص الكامل
  3. 23
  4. 24
  5. 25
  6. 26

    The Relation Between Respiratory & Acute Coronary Syndrome Using Data Mining Techniques حسب DOULEH, HANI ABDULLAH YOSEF ABU

    منشور في 2018
    "…The purpose of this study is to diagnose acute coronary syndrome using the widely available respiratory diagnosing tools and laboratory test results using data mining classification techniques (Decision tree, Gradient boosted tree, Neural Network, and Naïve Bias). …"
    احصل على النص الكامل
  7. 27

    Oversampling techniques for imbalanced data in regression حسب Samir Brahim Belhaouari (9427347)

    منشور في 2024
    "…For tabular data we conducted a comprehensive experiment using various models trained on both augmented and non-augmented datasets, followed by performance comparisons on test data. …"
  8. 28

    Unsupervised outlier detection in multidimensional data حسب Atiq ur Rehman (14153391)

    منشور في 2022
    "…<p>Detection and removal of outliers in a dataset is a fundamental preprocessing task without which the analysis of the data can be misleading. Furthermore, the existence of anomalies in the data can heavily degrade the performance of machine learning algorithms. …"
  9. 29

    Efficient Approximate Conformance Checking Using Trie Data Structures حسب Awad, Ahmed

    منشور في 2021
    "…By encoding the proxy behavior using a trie data structure, we obtain a logarithmically reduced search space for alignment computation compared to a set-based representation. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  10. 30

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment حسب Zakaria Tolba (16904718)

    منشور في 2022
    "…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …"
  11. 31

    Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm حسب Abu Zitar, Raed

    منشور في 2022
    "…Moreover, the image pixels in different and more similar areas of the image are located next to one another in a group and classified using the specified thresholds. As a result, the embedding capacity in each class can increase by reducing the value of the difference between two consecutive pixels, and the distortion of the marked image can decrease after inserting the personal data using the DE method. …"
    احصل على النص الكامل
  12. 32

    The Effects of Data Mining on Small Businesses in Dubai حسب AlMutawa, Rasha

    منشور في 2011
    "…While there are numerous studies on the best data mining models and their uses, even on certain industries, this study focuses on the applications more than the algorithms and models and their usefulness for small businesses specifically. …"
    احصل على النص الكامل
  13. 33
  14. 34

    Detecting sleep outside the clinic using wearable heart rate devices حسب Ignacio Perez-Pozuelo (14153007)

    منشور في 2022
    "…We developed and tested a heart rate-based algorithm that captures inter- and intra-individual sleep differences in free-living conditions and does not require human input. …"
  15. 35

    GenDE: A CRF-Based Data Extractor حسب Kayed, Mohammed

    منشور في 2020
    "…If the wrapper failed to work with the new page, a new wrapper/schema would be re-generated by calling an unsupervised wrapper induction system. In this paper, a new data extractor called GenDE is proposed. It verifies the site schema and extracts data from the Web pages using Conditional Random Fields (CRFs). …"
    احصل على النص الكامل
    احصل على النص الكامل
  16. 36
  17. 37

    A neural networks algorithm for data path synthesis حسب Harmanani, Haidar M.

    منشور في 2003
    "…This paper presents a deterministic parallel algorithm to solve the data path allocation problem in high-level synthesis. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 38

    Data reductions and combinatorial bounds for improved approximation algorithms حسب Abu-Khzam, Faisal N.

    منشور في 2016
    "…Kernelization algorithms in the context of Parameterized Complexity are often based on a combination of data reduction rules and combinatorial insights. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 39
  20. 40