Search alternatives:
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
trained using » brines using (Expand Search)
Showing 81 - 100 results of 750 for search '(( relevant data algorithm ) OR ((( data using algorithm ) OR ( trained using algorithm ))))', query time: 0.13s Refine Results
  1. 81
  2. 82

    Capturing outline of fonts using genetic algorithm and splines by Sarfraz, M.

    Published 2001
    “…Some examples are given to show the results obtained from the algorithm…”
    Get full text
    Get full text
    article
  3. 83
  4. 84

    Prediction of pressure gradient for oil-water flow: A comprehensive analysis on the performance of machine learning algorithms by Md Ferdous Wahid (13485799)

    Published 2022
    “…A total of eleven hundred experimental data points for nine FPs (two stratified and seven dispersed patterns) in horizontal wellbores are used to develop the MLs. …”
  5. 85

    Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation by Fawaz Kserawi (16904859)

    Published 2022
    “…We describe our differentially-private model with flexible constraints and a dynamic window algorithm to maintain the privacy-budget loss in infinitely generated time-series data. …”
  6. 86
  7. 87

    A Survey of Audio Enhancement Algorithms for Music, Speech, Bioacoustics, Biomedical, Industrial, and Environmental Sounds by Image U-Net by Sania Gul (18272227)

    Published 2023
    “…We will discuss the need for AE, U-Net comparison to other DNNs, the benefits of converting the audio to 2D, input representations that are useful for different AE applications, the architecture of vanilla U-Net and the pre-trained models, variations in vanilla architecture incorporated in different E models, and the state-of-the-art AE algorithms based on U-Net in various applications. …”
  8. 88

    Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators by Abu Zitar, Raed

    Published 2021
    “…The outcomes of the DNA microarray is a table/matrix, called gene expression data. Pattern recognition algorithms are widely applied to gene expression data to differentiate between health and cancerous patient samples. …”
    Get full text
  9. 89

    Intelligent Bilateral Client Selection in Federated Learning Using Game Theory by Wehbi, Osama

    Published 2022
    “…To overcome this problem, we present in this paper FedMint, an intelligent client selection approach for federated learning on IoT devices using game theory and bootstrapping mechanism. Our solution involves designing (1) preference functions for the client IoT devices and federated servers to allow them to rank each other according to several factors such as accuracy and price, (2) intelligent matching algorithms that take into account the preferences of both parties in their design, and (3) bootstrapping technique that capitalizes on the collaboration of multiple federated servers in order to assign initial accuracy value for the new connected IoT devices. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  10. 90
  11. 91

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector by AL HAMMADI, SUMAYYA ABDULLA

    Published 2022
    “…The method used in this research is a classification of models and algorithms used in data mining. …”
    Get full text
  12. 92
  13. 93

    Data Embedding in HEVC Video by Modifying the Partitioning of Coding Units by Shanableh, Tamer

    Published 2019
    “…The flags pertaining to 16x16 sub CUs are used as a cover for data embedding, where 6 or 4 message bits are embedded per CU. …”
    Get full text
    article
  14. 94
  15. 95

    Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey by Faria Nawshin (21841598)

    Published 2024
    “…As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. There are many machine-learning and deep-learning algorithms have been developed by researchers. …”
  16. 96

    Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing by Jincheng Zhou (1887307)

    Published 2023
    “…This paper provides a comparative analysis of various metaheuristic load balancing algorithms for cloud computing based on performance factors i.e., Makespan time, degree of imbalance, response time, data center processing time, flow time, and resource utilization. …”
  17. 97

    Customs Trade Facilitation and Compliance for Ecommerce using Blockchain and Data Mining by Alqaryouti, Omar

    Published 2021
    “…Additionally, the Cross Industry Standard Process for Data Mining (CRISP-DM) methodology is employed for modelling the two proposed clustering algorithms to identify transactional risks. …”
    Get full text
  18. 98
  19. 99

    Random Forest Bagging and X‐Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data by Rajesh Kumar Dhanaraj (19646269)

    Published 2021
    “…<p dir="ltr">In the current ongoing crisis, people mostly rely on mobile phones for all the activities, but query analysis and mobile data security are major issues. Several research works have been made on efficient detection of antipatterns for minimizing the complexity of query analysis. …”
  20. 100