يعرض 121 - 140 نتائج من 272 نتيجة بحث عن '(( elements network algorithm ) OR ((( data working algorithms ) OR ( data code algorithm ))))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 121
  2. 122
  3. 123
  4. 124

    Practical Multiple Node Failure Recovery in Distributed Storage Systems حسب Itani, M.

    منشور في 2016
    "…The fractional repetition (FR) code is a class of regenerating codes that consists of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  5. 125
  6. 126
  7. 127

    Building power consumption datasets: Survey, taxonomy and future directions حسب Yassine Himeur (14158821)

    منشور في 2020
    "…The latter will be very useful for testing and training anomaly detection algorithms, and hence reducing wasted energy. Moving forward, a set of recommendations is derived to improve datasets collection, such as the adoption of multi-modal data collection, smart Internet of things data collection, low-cost hardware platforms and privacy and security mechanisms. …"
  8. 128

    Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE حسب Mathew, Elezabeth

    منشور في 2020
    "…The novel LSTM time series algorithm proved to work best for demand forecasting. …"
    احصل على النص الكامل
  9. 129

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts حسب ALSHAMSI, SUROUR

    منشور في 2022
    "…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
    احصل على النص الكامل
  10. 130
  11. 131
  12. 132
  13. 133
  14. 134

    Deploying model obfuscation: towards the privacy of decision-making models on shared platforms حسب Sadhukhan, Payel

    منشور في 2024
    "…The implementation nuances involve data and model sharing among allies and partners working on the same domain. …"
    احصل على النص الكامل
    احصل على النص الكامل
  15. 135

    Android Malware Detection Using Machine Learning حسب Al Ali, Shaikha

    منشور في 2024
    "…This paper presents a machine learning approach for Android malware detection. In this work, several machine learning algorithms were utilized, namely k-Nearest neighbor (KNN), Decision Trees (DT), Naive Bayes (NB), Support Vector Machine (SVM) and other ensemble classifiers including Extreme Gradient Boosting (XGBoost), Light Gradient Boosting Machine (LGBM) and CatBoost. …"
    احصل على النص الكامل
    article
  16. 136
  17. 137

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches حسب Natasha Akram (20749538)

    منشور في 2024
    "…Responding to overcome this problem, the work at hand implements ten top-performing Synthetic Minority Oversampling Technique (SMOTE) variants. …"
  18. 138

    Generative AI revolution in cybersecurity: a comprehensive review of threat intelligence and operations حسب Mueen Uddin (4903510)

    منشور في 2025
    "…<p dir="ltr">Cyber threats are increasingly frequent in today’s world, posing challenges for organizations and individuals to protect their data from cybercriminals. On the other hand, Generative Artificial Intelligence (GAI) technology offers an efficient way to automatically address these issues with the help of AI models and algorithms. …"
  19. 139

    Enhanced PSO-Based NN for Failures Detection in Uncertain Wind Energy Systems حسب Khaled Dhibi (16891524)

    منشور في 2023
    "…First, a feature selection tool using PSO Algorithm is developed. Then, in order to maximize the diversity between data samples and improve the effectiveness of using PSO algorithm for feature selection, the Euclidean distance metric is used in order to reduce the data and maximize the diversity between data samples. …"
  20. 140