يعرض 281 - 300 نتائج من 311 نتيجة بحث عن 'differences ((modeling algorithm) OR (scheduling algorithm))', وقت الاستعلام: 0.07s تنقيح النتائج
  1. 281

    Data mining approach to predict student's selection of program majors حسب SIDDARTHA, SHARMILA

    منشور في 2019
    "…Cross validation is applied to train and test performance of models. Naïve Bayes, Decision Trees offered the best predictions across the different sampling techniques. …"
    احصل على النص الكامل
  2. 282

    CNN feature and classifier fusion on novel transformed image dataset for dysgraphia diagnosis in children حسب Jayakanth, Kunhoth

    منشور في 2023
    "…The extracted CNN features are then fused in different combinations. Three machine learning algorithms support vector machine (SVM), AdaBoost, and Random forest are employed to assess the performance of the CNN features and fused CNN features. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 283

    Behavior-Based Machine Learning Approaches to Identify State-Sponsored Trolls on Twitter حسب Saleh Alhazbi (16869960)

    منشور في 2020
    "…Based on these features, we developed four classification models to identify political troll accounts, these models are based on decision tree, random forest, Adaboost, and gradient boost algorithms. …"
  4. 284

    Use data Mining Techniques to Predict Users’ Engagement on the Social Network Posts in The Period Before, During and After Ramadan حسب AL RAWASHDEH, HANEEN MOHAMMAD

    منشور في 2017
    "…In this thesis, the effectiveness of using a data mining classifier helps to predict users’ engagement with a social media post before publishing and anticipating the best type of media for the post. Different classification algorithms were applied to the dataset using the Rapidminer tool. …"
    احصل على النص الكامل
  5. 285

    Design and analysis of efficient and secure elliptic curve cryptoprocessors. حسب Al-Somani, Turki Faisal

    منشور في 2006
    "…The proposed architectures have been modeled using VHDL and implemented on FPGA platform.…"
    احصل على النص الكامل
    masterThesis
  6. 286

    Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis حسب Hassan Ali (3348749)

    منشور في 2023
    "…We experiment with multiple attackers—Text-bugger, Text-fooler, PWWS—on several architectures—MLP, CNN, LSTM, Hybrid CNN-RNN, BERT—trained for different classification tasks—IMDB sentiment classification, fake-news classification, AG news topic classification—under different threat models—Con-Detect-blind attacks, Con-Detect-aware attacks, and Con-Detect-adaptive attacks—and show that Con-Detect can reduce the attack success rate (ASR) of different attacks from 100% to as low as 0% for the best cases and ≈70% for the worst case. …"
  7. 287

    A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications حسب Sharafeddine, Sanaa

    منشور في 2011
    "…However, the computational as well as memory access requirements of compression algorithms could consume more energy than simply transmitting data uncompressed. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 288

    Integration of nonparametric fuzzy classification with an evolutionary-developmental framework to perform music sentiment-based analysis and composition حسب Abboud, Ralph

    منشور في 2019
    "…Over the past years, several approaches have been developed to create algorithmic music composers. Most existing solutions focus on composing music that appears theoretically correct or interesting to the listener. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 289

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
  10. 290

    Sentiment Analysis for Arabic Social media Movie Reviews Using Deep Learning حسب MEZAHEM, FATEMA HAMAD

    منشور في 2022
    "…The two movies are Wahed Tani which translates to (someone else) and Amahom which translate to (their uncle), Three datasets were employed, and several categorization models were compared across them. Prior to performing sentiment analysis, it is necessary to prepare the data so that it may be used to train machine learning (ML) algorithms. …"
    احصل على النص الكامل
  11. 291
  12. 292

    CNN feature and classifier fusion on novel transformed image dataset for dysgraphia diagnosis in children حسب Jayakanth Kunhoth (14158908)

    منشور في 2023
    "…The extracted CNN features are then fused in different combinations. Three machine learning algorithms support vector machine (SVM), AdaBoost, and Random forest are employed to assess the performance of the CNN features and fused CNN features. …"
  13. 293

    Artificial Intelligence for Skin Cancer Detection: Scoping Review حسب Abdulrahman Takiddin (14153181)

    منشور في 2021
    "…</p><h3>Conclusions</h3><p dir="ltr">This paper examined multiple AI-based skin cancer detection models. However, a direct comparison between methods was hindered by the varied use of different evaluation metrics and image types. …"
  14. 294

    Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review حسب Yasir Ali (799969)

    منشور في 2023
    "…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …"
  15. 295

    Identification of phantom movements with an ensemble learning approach حسب Akhan Akbulut (17380285)

    منشور في 2022
    "…In the current study, we utilized ensemble learning algorithms for the recognition and classification of phantom movements of the different amputation levels of the upper and lower extremity. …"
  16. 296

    HVAC system attack detection dataset حسب Mariam Elnour (14147790)

    منشور في 2021
    "…It aims to promote and support the research in the field of cybersecurity of HVAC systems in smart buildings by facilitating the validation of attack detection and mitigation strategies, benchmarking the performance of different data-driven algorithms, and studying the impact of attacks on the HVAC system.…"
  17. 297
  18. 298

    The role of Reinforcement Learning in software testing حسب Amr Abo-eleneen (17032284)

    منشور في 2023
    "…</p><h3>Results</h3><p dir="ltr">This study highlights different software testing types to which RL has been applied, commonly used RL algorithms and architecture for learning, challenges faced, advantages and disadvantages of using RL, and the performance comparison of RL-based models against other techniques.…"
  19. 299

    MLMRS-Net: Electroencephalography (EEG) motion artifacts removal using a multi-layer multi-resolution spatially pooled 1D signal reconstruction network حسب Sakib Mahmud (15302404)

    منشور في 2022
    "…The performance of the deep learning models is measured using three well-known performance matrices viz. mean absolute error (MAE)-based construction error, the difference in the signal-to-noise ratio (ΔSNR), and percentage reduction in motion artifacts (<i>η</i>). …"
  20. 300