Search alternatives:
learning algorithm » learning algorithms (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
data fitting » data mining (Expand Search), data hiding (Expand Search)
learning algorithm » learning algorithms (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
data fitting » data mining (Expand Search), data hiding (Expand Search)
-
1
Data Embedding in HEVC Video by Modifying the Partitioning of Coding Units
Published 2019Subjects: Get full text
article -
2
-
3
Development of an Optimization Algorithm for Internet Data Traffic
Published 2020“…The algorithm monitors data repetitions in IP datagram and prepares a compression code in response of this repetition. …”
Get full text
article -
4
-
5
Practical single node failure recovery using fractional repetition codes in data centers
Published 2016“…FR codes consist of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
6
-
7
Genetic and heuristic algorithms for regrouping service sites. (c2000)
Published 2000Get full text
Get full text
masterThesis -
8
UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data
Published 2024“…UniBFS exploits the inherent characteristic of binary algorithms-binary coding-to search the entire problem space for identifying relevant features while avoiding irrelevant ones. …”
-
9
-
10
Predicting Patient ICU Readmission Using Recurrent Neural Networks With Long Short-Term Memory
Published 2025Subjects: -
11
Nonlinear analysis of shell structures using image processing and machine learning
Published 2023“…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …”
-
12
-
13
Bird’s Eye View feature selection for high-dimensional data
Published 2023“…This approach is inspired by the natural world, where a bird searches for important features in a sparse dataset, similar to how a bird search for sustenance in a sprawling jungle. BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …”
-
14
A decentralized load balancing strategy for parallel search-three optimization. (c2010)
Published 2010Get full text
Get full text
masterThesis -
15
-
16
A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems
Published 2025“…<p dir="ltr">Federated Learning (FL) is gaining traction in Android-based consumer electronics, enabling collaborative model training across decentralized devices while preserving data privacy. However, the increasing adoption of FL in these devices exposes them to adversarial attacks that can compromise user data and device security. …”
-
17
Oversampling techniques for imbalanced data in regression
Published 2024“…For such high-dimension data our approach outperforms the Synthetic Minority Oversampling Technique for Regression (SMOTER) algorithm for the IMDB-WIKI and AgeDB image datasets. …”
-
18
Bee Colony Algorithm for Proctors Assignment.
Published 2015“…The search accomplished by three types of bees over a number of iterations aiming to find the source with the highest nectar value (fitness value of a candidate solution). We apply the Bee Colony algorithm to previously published data. …”
Get full text
Get full text
Get full text
article -
19
Dynamic adaptation for video streaming over mobile devices. (c2013)
Published 2013Get full text
Get full text
masterThesis -
20