بدائل البحث:
generation algorithm » genetic algorithm (توسيع البحث)
change detection » drone detection (توسيع البحث)
يعرض 1 - 20 نتائج من 73 نتيجة بحث عن '(( code ((generation algorithm) OR (selection algorithm)) ) OR ( change detection algorithm ))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 1

    UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data حسب Behrouz Ahadzadeh (19757022)

    منشور في 2024
    "…To overcome these challenges, a new FS algorithm named Uniform-solution-driven Binary Feature Selection (UniBFS) has been developed in this study. …"
  2. 2

    Detection of statistically significant network changes in complex biological networks حسب Raghvendra Mall (581171)

    منشور في 2017
    "…It can happen that due to gene mutations, as for example when cancer progresses, the gene expression network undergoes some amount of localized re-wiring. The ability to detect statistical relevant changes in the interaction patterns induced by the progression of the disease can lead to the discovery of novel relevant signatures. …"
  3. 3

    Minimum traffic inter-BS SHO boundary selection algorithm for CDMA-based wireless networks حسب Abu-Amara, M.

    منشور في 2004
    "…An algorithm is presented to select an inter-base station soft handoff (inter-BS SHO) boundary for code division multiple access (CDMA)-based wireless networks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 4
  5. 5

    Land Use/Land Cover Changes Impact on Groundwater Level and Quality in the Northern Part of the United Arab Emirates حسب Elmahdy, Samy

    منشور في 2020
    "…Each pair of enhanced LULC maps (1990–2000, 2000–2010, 2010–2018, and 1990–2018) were used as input data for an image difference algorithm to monitor LULC changes. Maps of change detection were then imported into a GIS environment and spatially correlated against the spatiotemporal maps of groundwater level and groundwater quality. …"
    احصل على النص الكامل
    article
  6. 6
  7. 7

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts حسب ALSHAMSI, SUROUR

    منشور في 2022
    "…The research work carried out, in relation to attack detection ensemble learning, mainly aims to increase the performance of machine learning algorithms by combining their results. …"
    احصل على النص الكامل
  8. 8

    LNCRI: Long Non-Coding RNA Identifier in Multiple Species حسب Saleh Musleh (15279190)

    منشور في 2021
    "…<p>The pervasive nature of long non-coding RNA (lncRNA) transcription in the mammalian genomes has changed our protein-centric view of genomes. …"
  9. 9

    CNN and HEVC Video Coding Features for Static Video Summarization حسب Issa, Obada

    منشور في 2022
    "…During coding, 64 proposed features were generated from the coder for each frame. …"
    احصل على النص الكامل
    article
  10. 10

    Generating haptic texture using solid noise حسب Osama Halabi (14158905)

    منشور في 2021
    "…In computer haptics, texture can render environments more realistic and provide useful information. In this paper, an algorithm is proposed for virtual texture simulation by using solid noise, where only a few parameters need to be altered to generate a range of realistic and diverse textures by reproducing different frequencies similar to that of real vibrational signals in a virtual environment. …"
  11. 11

    Large language models for code completion: A systematic literature review حسب Rasha Ahmad Husein (19744756)

    منشور في 2024
    "…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …"
  12. 12
  13. 13
  14. 14

    Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis حسب Hassan, Ali

    منشور في 2023
    "…Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 15

    Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis حسب Hassan Ali (3348749)

    منشور في 2023
    "…<p>Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …"
  16. 16

    Practical single node failure recovery using fractional repetition codes in data centers حسب Itani, May

    منشور في 2016
    "…Node failures in distributed storage systems are becoming a critical issue, and many erasure codes are designed to handle such failures. The purpose of this paper is to evaluate fractional repetition (FR) codes, a class of regenerating codes for distributed storage systems, as a practical solution. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  17. 17
  18. 18

    A new genetic algorithm approach for unit commitment حسب Mantawy, A.H.

    منشور في 1997
    "…In the proposed algorithm, coding the solution of the unit commitment problem is based on mixing binary and decimal representations. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 19

    Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators حسب Abu Zitar, Raed

    منشور في 2021
    "…DNA microarray technology is the fabrication of a single chip to contain a thousand genetic codes. Each microarray experiment can analyze many thousands of genes in parallel. …"
    احصل على النص الكامل
  20. 20