بدائل البحث:
solution algorithm » auction algorithm (توسيع البحث), pollination algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
search » research (توسيع البحث)
solution algorithm » auction algorithm (توسيع البحث), pollination algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
search » research (توسيع البحث)
-
161
Use data Mining Techniques to Predict Users’ Engagement on the Social Network Posts in The Period Before, During and After Ramadan
منشور في 2017"…Different classification algorithms were applied to the dataset using the Rapidminer tool. …"
احصل على النص الكامل
-
162
The use of multi-task learning in cybersecurity applications: a systematic literature review
منشور في 2024"…Five critical applications, such as network intrusion detection and malware detection, were identified, and several tasks used in these applications were observed. Most of the studies used supervised learning algorithms, and there were very limited studies that focused on other types of machine learning. …"
-
163
A Novel Big Data Classification Technique for Healthcare Application Using Support Vector Machine, Random Forest and J48
منشور في 2022"…The performance of the algorithms for accuracy was evaluated using the Healthcare (heart attack possibility) dataset, freely available on kagle. …"
احصل على النص الكامل
-
164
QU-GM: An IoT Based Glucose Monitoring System From Photoplethysmography, Blood Pressure, and Demographic Data Using Machine Learning
منشور في 2024"…We collected PPG signals, demographic information, and blood pressure data from 139 diabetic (49.65%) and non-diabetic (50.35%) subjects. …"
-
165
Solution of Fractional Differential Equations: Transform and Iterative Methods Approach
منشور في 2019احصل على النص الكامل
doctoralThesis -
166
A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems
منشور في 2025"…<p dir="ltr">Federated Learning (FL) is gaining traction in Android-based consumer electronics, enabling collaborative model training across decentralized devices while preserving data privacy. However, the increasing adoption of FL in these devices exposes them to adversarial attacks that can compromise user data and device security. …"
-
167
Iterative Methods for the Solution of a Steady State Biofilter Model
منشور في 2017احصل على النص الكامل
doctoralThesis -
168
Predicting Plasma Vitamin C Using Machine Learning
منشور في 2022"…The objective of this study is to predict plasma vitamin C using machine learning. The NHANES dataset was used to predict plasma vitamin C in a cohort of 2952 American adults using regression algorithms and clustering in a way that a hypothetical health application might. …"
-
169
Stochastic Search Algorithms for Exam Scheduling
منشور في 2007"…Then, we empirically compare the three proposed algorithms and FESP using realistic data. Our experimental results show that SA and GA produce good exam schedules that are better than those of FESP heuristic procedure. …"
احصل على النص الكامل
احصل على النص الكامل
article -
170
The social media Infodemic of health-related misinformation and technical solutions
منشور في 2024"…It aims to propose solutions to combat misinformation and promote accurate, evidence-based public health information.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
171
A Modified PWM Strategy With an Improved ANN Based MPPT Algorithm for Solar PV Fed NPC Inverter Driven Induction Motor Drives
منشور في 2023"…Apart from that, a robust artificial neutral network (ANN) based incremental conductance maximum power point tracking (MPPT) algorithm is also introduced to control the dc-link voltage of the PV fed NPC inverter driven IMD system. …"
-
172
Scalable Parallel Algorithms for FPT Problems
منشور في 2006"…Algorithmic methods based on the theory of fixed-parameter tractability are combined with powerful computational platforms to launch systematic attacks on combinatorial problems of significance. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
173
-
174
Robust Control Of Sampled Data Systems
منشور في 2020"…They then present a numerical controller design algorithm based on the derived bounds. Examples are used for demonstration.…"
احصل على النص الكامل
article -
175
Robust Control Of Sampled Data Systems
منشور في 2020"…They then present a numerical controller design algorithm based on the derived bounds. Examples are used for demonstration.…"
احصل على النص الكامل
article -
176
Robust Control Of Sampled Data Systems
منشور في 2020"…They then present a numerical controller design algorithm based on the derived bounds.Examples are used for demonstration.…"
احصل على النص الكامل
article -
177
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
منشور في 2024"…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …"
-
178
Improvement Algorithm for Limited Space Scheduling
منشور في 2001"…The model characterizes resource space requirements over time and establishes a time-space relationship for each activity in the schedule, based on alternative resource levels. An example illustrates the presented algorithm that generates a feasible space schedule.…"
احصل على النص الكامل
احصل على النص الكامل
article -
179
Oversampling techniques for imbalanced data in regression
منشور في 2024"…For tabular data we conducted a comprehensive experiment using various models trained on both augmented and non-augmented datasets, followed by performance comparisons on test data. …"
-
180
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
منشور في 2022"…<p>Communication has become a lot easier in this era of technology, development of high-speed computer networks, and the inexpensive uses of Internet. Therefore, data transmission has become vulnerable to and unsafe from different external attacks. …"