Suggested Topics within your search.
Search alternatives:
prediction » reduction (Expand Search)
Showing 1,801 - 1,820 results of 17,643 for search '((predictive OR prediction) OR education) algorithms', query time: 0.40s Refine Results
  1. 1801

    Quantitative method for network security situation based on attack prediction by Hao HU, Run-guo YE, Hong-qi ZHANG, Ying-jie YANG, Yu-ling LIU

    Published 2017-10-01
    “…To predict the attack behaviors accurately and comprehensively as well as to quantify the threat of attack,a quantitative method for network security situation based on attack prediction was proposed.By fusing the situation factors of attacker,defender and network environment,the capability of attacker and the exploitability rate of vulnerability were evaluated utilizing the real-time detected attack events,and the expected time-cost for attack-defense were further calculated.Then an attack prediction algorithm based on the dynamic Bayesian attack graph was designed to infer the follow-up attack actions.At last,the attack threat was quantified as the security risk situation from two levels of the hosts and the overall network.Experimental analysis indicates that the proposed method is suitable for the real adversarial network environment,and is able to predict the occurrence time of attack accurately and quantify the attack threat reasonably.…”
    Get full text
    Article
  2. 1802

    Quantitative method for network security situation based on attack prediction by Hao HU, Run-guo YE, Hong-qi ZHANG, Ying-jie YANG, Yu-ling LIU

    Published 2017-10-01
    “…To predict the attack behaviors accurately and comprehensively as well as to quantify the threat of attack,a quantitative method for network security situation based on attack prediction was proposed.By fusing the situation factors of attacker,defender and network environment,the capability of attacker and the exploitability rate of vulnerability were evaluated utilizing the real-time detected attack events,and the expected time-cost for attack-defense were further calculated.Then an attack prediction algorithm based on the dynamic Bayesian attack graph was designed to infer the follow-up attack actions.At last,the attack threat was quantified as the security risk situation from two levels of the hosts and the overall network.Experimental analysis indicates that the proposed method is suitable for the real adversarial network environment,and is able to predict the occurrence time of attack accurately and quantify the attack threat reasonably.…”
    Get full text
    Article
  3. 1803
  4. 1804
  5. 1805

    Long short-term memory (LSTM) networks for precision prediction of Schottky barrier photodiode behavior at different illumination levels by Gökalp Tulum, Sajjad Nematzadeh, İlke Taşçıoğlu, Şemsettin Altındal, Fahrettin Yakuphanoğlu

    Published 2025-07-01
    “…Abstract This study has focused on modeling and predicting the electrical properties and parameters of CdZnO interlayered Al/p-Si Schottky Diodes (SDs) using the Long Short-Term Memory (LSTM) algorithm. …”
    Get full text
    Article
  6. 1806
  7. 1807
  8. 1808

    The Evaluation of Online Education Course Performance Using Decision Tree Mining Algorithm by Yongxian Yang

    Published 2021-01-01
    “…The decision tree mining algorithm can classify the data, grasp the teaching process of the teacher, and analyze the overall performance of the students, so as to realize the dynamic management of the educational administration and help the educational administration personnel to make the right decision, with more reasonable allocation of resources. …”
    Get full text
    Article
  9. 1809

    Improved Genetic Algorithm for English Information Education and Teaching Quality Impact Analysis by Yuanbo Li, Wanhe Song

    Published 2022-01-01
    “…Experimental results show that this algorithm has higher efficiency and quality than other algorithms with better performance, and the proposed teaching system can improve the teaching quality of English information education.…”
    Get full text
    Article
  10. 1810
  11. 1811

    Development of an algorithm for managing an educational organization based on feedback and value-based management by Tikhonov Dmitriy

    Published 2025-06-01
    “…The purpose of this study is to develop an algorithm for managing an educational organization based on value management principles, taking into account the features of the digital transformation of higher education. …”
    Get full text
    Article
  12. 1812

    Learning Path Analysis of Optimizing Educational Data Mining Based on Genetic Algorithm by Wu Yanhong

    Published 2025-01-01
    “…With the extensive use of educational data mining in the field of learning analysis, identifying an effective approach to maximize learning route analysis has become a research priority. …”
    Get full text
    Article
  13. 1813
  14. 1814

    A model for predicting academic performance on standardised tests for lagging regions based on machine learning and Shapley additive explanations by Mario Suaza-Medina, Rita Peñabaena-Niebles, Maria Jubiz-Diaz

    Published 2024-10-01
    “…Abstract Data are becoming more important in education since they allow for the analysis and prediction of future behaviour to improve academic performance and quality at educational institutions. …”
    Get full text
    Article
  15. 1815

    Paradigm predictive analysis of two-phase Eyring–Powell fluid flow over a vertical stretching sheet with temperature-dependent viscosity by multilayer neural networks by Zahoor Shah, Hamza Iqbal, Waqar Azeem Khan, Taseer Muhammad, Muhammad Shoaib

    Published 2025-08-01
    “…Its consistently low MSE (mean square error) values (at the scale of E-09 to E-10) make it a good approximation for most scenarios; there is very little deviation and strong predictability. The results obtained validate the robustness of the DLNNs-LMA approach to solve complex fluid dynamics problems. …”
    Get full text
    Article
  16. 1816
  17. 1817
  18. 1818

    Modelling and Predicting the Breaking Strength and Mass Irregularity of Cotton Rotor-Spun Yarns Containing Cotton Fiber Recovered from Ginning Process by Using Artificial Neural Network Algorithm by Mohsen Shanbeh, Hossein Hasani, Somayeh Akhavan Tabatabaei

    Published 2011-01-01
    “…The purpose of this study was to develop predictive models of breaking strength and mass irregularity (CV𝑚%) of cotton waste rotor-spun yarns containing cotton waste collected from ginning process by using the artificial neural network trained with backpropagation algorithm. …”
    Get full text
    Article
  19. 1819
  20. 1820

    Development of an algorithm to improve on the National Early Warning Score 2 (NEWS2) system's accuracy in predicting critical outcomes using additional patient data and amendments to the scoring process by Lynsey Threlfall, Chris Plummer, Edward Meinert, Cen Cong, Madison Milne-Ives

    Published 2025-07-01
    “…Using these datasets, we will train and test an algorithm that optimises the variables and their weightings to predict the risk of key clinical outcomes, including mortality, intensive care unit admission, sepsis and cardiac arrest, to demonstrate a proof of concept for a modified scoring system. …”
    Get full text
    Article