يعرض 41 - 60 نتائج من 185 نتيجة بحث عن '(( relevant data algorithm ) OR ((( data finding algorithm ) OR ( neural coding algorithm ))))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 41
  2. 42
  3. 43

    A fast exact sequential algorithm for the partial digest problem حسب Mostafa M. Abbas (17058093)

    منشور في 2016
    "…Two types of simulated data, random and Zhang, are used to measure the efficiency of the algorithm. …"
  4. 44

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector حسب AL HAMMADI, SUMAYYA ABDULLA

    منشور في 2022
    "…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …"
    احصل على النص الكامل
  5. 45
  6. 46

    The unified effect of data encoding, ansatz expressibility and entanglement on the trainability of HQNNs حسب Muhammad Kashif (3923483)

    منشور في 2023
    "…One of the prominent challenges lies in the presence of barren plateaus (BP) in QML algorithms, particularly in quantum neural networks (QNNs). …"
  7. 47

    A data envelopment analysis model for opinion leaders’ identification in social networks حسب Hamed Baziyad (19273738)

    منشور في 2024
    "…The graph-based methods are one of the most important approaches for finding OLs in OSNs. Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. …"
  8. 48

    UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices حسب Samir, Moataz

    منشور في 2019
    "…To solve it, we first propose the high-complexity branch, reduce and bound (BRB) algorithm to find the global optimal solution for relatively small scale scenarios. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 49

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems حسب Almajed, Rasha

    منشور في 2022
    "…We begin a process to cleaning up the data in the CPS database by applying normalization to eliminate errors and duplication. …"
    احصل على النص الكامل
    احصل على النص الكامل
  10. 50

    Artificial intelligence-based methods for fusion of electronic health records and imaging data حسب Farida Mohsen (16994682)

    منشور في 2022
    "…In our analysis, a typical workflow was observed: feeding raw data, fusing different data modalities by applying conventional machine learning (ML) or deep learning (DL) algorithms, and finally, evaluating the multimodal fusion through clinical outcome predictions. …"
  11. 51

    Automatic keyword extraction from a real estate classifieds data set حسب Devassy, Dibin

    منشور في 2011
    "…We begin with designing data cleansing algorithms to verify different attributes of the real estate classified. …"
    احصل على النص الكامل
  12. 52

    BioNetApp: An interactive visual data analysis platform for molecular expressions حسب Ali M. Roumani (18615124)

    منشور في 2019
    "…BioNetApp also provides data clustering based on molecular concentrations using Self Organizing Maps (SOM), K-Means, K-Medoids, and Farthest First algorithms.…"
  13. 53
  14. 54
  15. 55
  16. 56

    A Data-Driven Decision-Making Framework for Fleet Management in the Government Sector of Dubai حسب ALGHANEM, HANI SUBHI MOHD

    منشور في 2024
    "…Data-driven decision-making has become increasingly widespread and relevant across all business areas, including private and public sectors. …"
    احصل على النص الكامل
  17. 57
  18. 58

    Enhancing Personalized Learning Experiences through AI-driven Analysis of xAPI Data حسب ODEH, HANEEN

    منشور في 2024
    "…The Experience API (xAPI) provides a comprehensive mechanism to document all types of learning interactions, storing this stream of data into the Learning Record Store (LRS). This dissertation explores the fusion of Artificial Intelligence (AI) techniques with the obtained xAPI data. …"
    احصل على النص الكامل
  19. 59
  20. 60

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare حسب Haraty, Ramzi A.

    منشور في 2007
    "…To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. Since even segmenting the log into clusters may not solve the problem, as clusters/segments may grow to be humongous in size, this is in case of high data/transaction dependency, we suggest a method for segmenting the log into clusters and its sub-clusters; i.e, segmenting the cluster; based on exact data dependency [12], into sub-clusters; based on two different criteria: number of data items or space occupied. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article