Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
trained using » brines using (Expand Search)
Showing 101 - 120 results of 436 for search '(( movement data algorithm ) OR ((( data processing algorithm ) OR ( trained using algorithm ))))', query time: 0.16s Refine Results
  1. 101

    Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT by Arumugam K (18456690)

    Published 2021
    “…This paper proposes an Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT. …”
  2. 102

    Image-Based Air Quality Estimation Using Convolutional Neural Network Optimized by Genetic Algorithms: A Multi-Dataset Approach by Arshad Ali Khan (23152516)

    Published 2025
    “…This paper proposes a new approach using convolutional neural networks with genetic algorithms for estimating air quality directly from images. …”
  3. 103

    Bee Colony Algorithm for Proctors Assignment. by Mansour, Nashat

    Published 2015
    “…The Bee Colony algorithm is a recent population-based search algorithm that mimics the natural behavior of swarms of honey bees during the process of collecting food. …”
    Get full text
    Get full text
    Get full text
    article
  4. 104

    A Robust Deep Learning Approach for Distribution System State Estimation with Distributed Generation by Kfouri, Ronald

    Published 2023
    “…The algorithms are tested on three different networks. The proposed approach solves the DSSE problem with limited measurements as inputs, which cannot be solved using conventional state estimation methods. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  5. 105

    Process Mining over Unordered Event Streams by Awad, Ahmed

    Published 2020
    “…This requires online algorithms that, instead of keeping the whole history of event data, work incrementally and update analysis results upon the arrival of new events. …”
    Get full text
    Get full text
    Get full text
  6. 106

    Particle swarm optimization algorithm: review and applications by Abualigah, Laith

    Published 2024
    “…Particle swarm optimization (PSO) is a heuristic global optimization technique and an optimization algorithm that is swarm intelligence-based. It is based on studies into the movement of bird flocks. …”
    Get full text
  7. 107
  8. 108
  9. 109
  10. 110

    Spider monkey optimizations: application review and results by Abualigah, Laith

    Published 2024
    “…Optimization algorithms are applied to find efficient solutions in different problems in several fields such as the routing in wireless networks, cloud computing, big data, image processing and scheduling, and so forth. …”
    Get full text
  11. 111

    Sentiment visualization of correlation of loneliness mapped through social intelligence analysis by Hurmat Ali Shah (18192889)

    Published 2024
    “…Social media platforms have become a valuable source of data to study this phenomenon.</p><h3>Objectives</h3><p dir="ltr">This paper aims to visualize the frequency of loneliness-related themes and topics in Twitter data. …”
  12. 112
  13. 113
  14. 114

    Recent Advances of Chimp Optimization Algorithm: Variants and Applications by Daoud, Mohammad Sh.

    Published 2023
    “…Chimp Optimization Algorithm (ChOA) is one of the recent metaheuristics swarm intelligence methods. …”
    Get full text
  15. 115

    Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey by Faria Nawshin (21841598)

    Published 2024
    “…As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. There are many machine-learning and deep-learning algorithms have been developed by researchers. …”
  16. 116

    Data redundancy management for leaf-edges in connected environments by Mansour, Elio

    Published 2022
    “…Major advances in the fields of Internet and Communication Technology (ICT), data modeling/processing, and sensing technology have rendered traditional environments (e.g., cities, buildings) more connected. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  17. 117

    A hybrid graph representation for recursive backtracking algorithms by Abu-Khzam, Faisal N.

    Published 2017
    “…The performance of these algorithms often suffers from the increasing number of graph modifications, such as deletions, that reduce the problem instance and have to be “taken back” frequently during the search process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  18. 118

    The effects of data balancing approaches: A case study by Paul Mooijman (4453189)

    Published 2023
    “…Our results showed that the replacement method was effective, and LogisticRegression combined with the oversampling algorithms SMOTE or ADASYN, GaussianProcessClassifier with the oversampling algorithm SMOTE, and LinearDiscriminantAnalysis were the best performing models after log transformation of the dataset was followed by Recursive Feature Elimination.…”
  19. 119

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
    Get full text
  20. 120

    Multi-Modal Emotion Aware System Based on Fusion of Speech and Brain Information by M. Ghoniem, Rania

    Published 2019
    “…In all likelihood, while features from several modalities may enhance the classification performance, they might exhibit high dimensionality and make the learning process complex for the most used machine learning algorithms. …”
    Get full text
    Get full text