Search alternatives:
data tracking » radar tracking (Expand Search)
data finding » data mining (Expand Search), data hiding (Expand Search)
data tracking » radar tracking (Expand Search)
data finding » data mining (Expand Search), data hiding (Expand Search)
-
61
Enhancing Personalized Learning Experiences through AI-driven Analysis of xAPI Data
Published 2024“…The Experience API (xAPI) provides a comprehensive mechanism to document all types of learning interactions, storing this stream of data into the Learning Record Store (LRS). This dissertation explores the fusion of Artificial Intelligence (AI) techniques with the obtained xAPI data. …”
Get full text
-
62
-
63
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
Published 2007“…To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. Since even segmenting the log into clusters may not solve the problem, as clusters/segments may grow to be humongous in size, this is in case of high data/transaction dependency, we suggest a method for segmenting the log into clusters and its sub-clusters; i.e, segmenting the cluster; based on exact data dependency [12], into sub-clusters; based on two different criteria: number of data items or space occupied. …”
Get full text
Get full text
Get full text
article -
64
-
65
Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators
Published 2021“…The outcomes of the DNA microarray is a table/matrix, called gene expression data. Pattern recognition algorithms are widely applied to gene expression data to differentiate between health and cancerous patient samples. …”
Get full text
-
66
Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE
Published 2018“…We examined different feature selection methods and classification algorithms to find the best prediction model with the highest accuracy. …”
Get full text
-
67
-
68
Implementation and Comparison of Particle Swarm Optimization and Genetic Algorithm Techniques in Combined Economic Emission Dispatch of an Independent Power Plant
Published 2019“…The results are of great significance as the real data of an IPP is used and imply that the performance of PSO is better than that of GA in case of CEED for finding the optimal solution concerning fuel cost, emission, convergence characteristics, and computational time. …”
-
69
Haplotype inference by pure-parsimony using revamped delayed haplotype selection. (c2011)
Published 2011Get full text
Get full text
masterThesis -
70
Software defect prediction. (c2019)
Published 2019Get full text
Get full text
Get full text
masterThesis -
71
VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems
Published 2019“…The Nonnested Generalized Exemplars (NNGE) algorithm is one of the most accurate classification techniques that can work with such data of CPPS. …”
-
72
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Published 2022“…Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …”
-
73
Performance of artificial intelligence models in estimating blood glucose level among diabetic patients using non-invasive wearable device data
Published 2023“…One of the key aspects of WDs with machine learning (ML) algorithms is to find specific data signatures, called Digital biomarkers, that can be used in classification or gaging the extent of the underlying condition. …”
-
74
-
75
-
76
Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE
Published 2020“…The data analytics maturity model is used as the conceptual model for evaluating both data analytics and data governance in this research. …”
Get full text
-
77
Information warfare recovery-fighting back through the matrix. (c2012)
Published 2012Get full text
Get full text
masterThesis -
78
C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments
Published 2023“…The aim of streaming conformance checking is to find dis crepancies between process executions on streaming data and the refer ence process model. …”
Get full text
Get full text
Get full text
-
79
-
80
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
Published 2023“…Therefore, the suggested approach finds the main hole in undersea systems and fills it using robotic automation. …”