بدائل البحث:
using algorithms » cosine algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
يعرض 161 - 180 نتائج من 857 نتيجة بحث عن '(( elements network algorithm ) OR ((( data using algorithms ) OR ( solved using algorithm ))))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 161

    Fuzzy genetic algorithm for floorplanning حسب Youssef, H.

    منشور في 2020
    "…Genetic algorithms (GAs) have been found to be very effective in solving numerous optimization problems, especially those with many (possibly) conflicting and noisy objectives. …"
    احصل على النص الكامل
    article
  2. 162

    Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques حسب Ameema Zainab (16864263)

    منشور في 2020
    "…The obtained results illustrate the efficacy of the proposed algorithm to analyze the time series data from the IoT devices for spam detection.…"
  3. 163
  4. 164

    The use of multi-task learning in cybersecurity applications: a systematic literature review حسب Shimaa Ibrahim (22155739)

    منشور في 2024
    "…Five critical applications, such as network intrusion detection and malware detection, were identified, and several tasks used in these applications were observed. Most of the studies used supervised learning algorithms, and there were very limited studies that focused on other types of machine learning. …"
  5. 165
  6. 166

    A Novel Big Data Classification Technique for Healthcare Application Using Support Vector Machine, Random Forest and J48 حسب Al-Manaseer, Hitham

    منشور في 2022
    "…The performance of the algorithms for accuracy was evaluated using the Healthcare (heart attack possibility) dataset, freely available on kagle. …"
    احصل على النص الكامل
  7. 167

    Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT حسب Arumugam K (18456690)

    منشور في 2021
    "…This paper proposes an Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT. …"
  8. 168

    QU-GM: An IoT Based Glucose Monitoring System From Photoplethysmography, Blood Pressure, and Demographic Data Using Machine Learning حسب Md Nazmul Islam Shuzan (21842426)

    منشور في 2024
    "…We collected PPG signals, demographic information, and blood pressure data from 139 diabetic (49.65%) and non-diabetic (50.35%) subjects. …"
  9. 169

    Calibration of building model based on indoor temperature for overheating assessment using genetic algorithm: Methodology, evaluation criteria, and case study حسب Mutasim Baba, Fuad

    منشور في 2022
    "…It was found that the calibrated model achieved these metrics with RMSE of 0.3 ◦C, and MAD of 0.8 ◦C, and 85% of data points with an error less than 0.5 ◦C for a school building case.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  10. 170
  11. 171

    Enhancing Breast Cancer Diagnosis With Bidirectional Recurrent Neural Networks: A Novel Approach for Histopathological Image Multi-Classification حسب Rajendra Babu Chikkala (22330876)

    منشور في 2025
    "…In this study, we introduce an innovative method for the multi-classification of breast cancer histopathological images utilizing Bidirectional Recurrent Neural Networks (BRNN). The BRNN structure consists of four unique elements: the backbone branch for transfer learning, the Gated Recurrent Unit (GRU), the residual collaborative branch, and the feature fusion module. …"
  12. 172

    Optimum sensors allocation for drones multi-target tracking under complex environment using improved prairie dog optimization حسب Abu Zitar, Raed

    منشور في 2024
    "…The IPDOA performance was compared with the other 8 metaheuristic optimization algorithms and the testing showed its superiority over those techniques for solving this complex problem. …"
    احصل على النص الكامل
  13. 173

    A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems حسب Faria Nawshin (21841598)

    منشور في 2025
    "…<p dir="ltr">Federated Learning (FL) is gaining traction in Android-based consumer electronics, enabling collaborative model training across decentralized devices while preserving data privacy. However, the increasing adoption of FL in these devices exposes them to adversarial attacks that can compromise user data and device security. …"
  14. 174

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches حسب Natasha Akram (20749538)

    منشور في 2024
    "…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …"
  15. 175

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts حسب ALSHAMSI, SUROUR

    منشور في 2022
    "…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
    احصل على النص الكامل
  16. 176
  17. 177
  18. 178

    Data Redundancy Management in Connected Environments حسب Mansour, Elio

    منشور في 2020
    "…., building) equipped with sensors that produce and exchange raw data. Although the sensed data is considered to contain useful and valuable information, yet it might include various inconsistencies such as data redundancies, anomalies, and missing values. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  19. 179

    Unsupervised outlier detection in multidimensional data حسب Atiq ur Rehman (14153391)

    منشور في 2022
    "…<p>Detection and removal of outliers in a dataset is a fundamental preprocessing task without which the analysis of the data can be misleading. Furthermore, the existence of anomalies in the data can heavily degrade the performance of machine learning algorithms. …"
  20. 180