Search alternatives:
generation algorithm » genetic algorithm (Expand Search)
code generation » power generation (Expand Search), image generation (Expand Search)
wide detection » video detection (Expand Search), fire detection (Expand Search), ion detection (Expand Search)
generation algorithm » genetic algorithm (Expand Search)
code generation » power generation (Expand Search), image generation (Expand Search)
wide detection » video detection (Expand Search), fire detection (Expand Search), ion detection (Expand Search)
-
1
-
2
-
3
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Published 2022“…Machine learning (ML) methods are widely used in IDS. Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. …”
-
4
LNCRI: Long Non-Coding RNA Identifier in Multiple Species
Published 2021“…<p>The pervasive nature of long non-coding RNA (lncRNA) transcription in the mammalian genomes has changed our protein-centric view of genomes. …”
-
5
CNN and HEVC Video Coding Features for Static Video Summarization
Published 2022“…During coding, 64 proposed features were generated from the coder for each frame. …”
Get full text
article -
6
-
7
Generating haptic texture using solid noise
Published 2021“…In computer haptics, texture can render environments more realistic and provide useful information. In this paper, an algorithm is proposed for virtual texture simulation by using solid noise, where only a few parameters need to be altered to generate a range of realistic and diverse textures by reproducing different frequencies similar to that of real vibrational signals in a virtual environment. …”
-
8
Predicting Compression Modes and Split Decisions for HEVC Video Coding Using Machine Learning Techniques
Published 2017Get full text
doctoralThesis -
9
Dynamic adaptation for video streaming over mobile devices. (c2013)
Published 2013Get full text
Get full text
masterThesis -
10
Practical single node failure recovery using fractional repetition codes in data centers
Published 2016“…Node failures in distributed storage systems are becoming a critical issue, and many erasure codes are designed to handle such failures. The purpose of this paper is to evaluate fractional repetition (FR) codes, a class of regenerating codes for distributed storage systems, as a practical solution. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
11
-
12
Deepfakes Signatures Detection in the Handcrafted Features Space
Published 2023“…Obtained results using 4000 synthetic writers of GPDS synthetic database show that the proposed handcrafted features have considerable ability to detect synthetic signatures vs. two widely used real individuals signatures databases, namely CEDAR and GPDS-300, which reach 98.67% and 94.05% of successful synthetic detection rates respectively.…”
Get full text
-
13
A new genetic algorithm approach for unit commitment
Published 1997“…In the proposed algorithm, coding the solution of the unit commitment problem is based on mixing binary and decimal representations. …”
Get full text
Get full text
article -
14
Cyberbullying Detection in Arabic Text using Deep Learning
Published 2023“…Therefore, this study aims to evaluate several versions of Recurrent Neural Networks (RNNs) and Feedforward Neural Networks (FNNs) for detecting cyberbullying in the Arabic language. Although these algorithms are widely used in text classification and outperform the performance of classical classifiers, many have been extensively investigated in other domains such as sentiment analysis and dialect identification, as well as cyberbullying detection in English text. …”
Get full text
-
15
A genetic-based algorithm for fuzzy unit commitment model
Published 2000“…In the implementation for the GA, coding of the UCP solutions is based on mixing binary and decimal representations. …”
Get full text
Get full text
article -
16
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006“…The algorithm is tested using 200 randomly generated 2-variable 4-valued functions. …”
Get full text
Get full text
article -
17
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …”
Get full text
-
18
Integrating genetic algorithms, tabu search, and simulatedannealing for the unit commitment problem
Published 1999“…The core of the proposed algorithm is based on genetic algorithms. Tabu search is used to generate new population members in the reproduction phase of the genetic algorithm. …”
Get full text
Get full text
article -
19
NOVEL STACKING CLASSIFICATION AND PREDICTION ALGORITHM BASED AMBIENT ASSISTED LIVING FOR ELDERLY
Published 2022“…Therefore, this thesis proposed a Novel Stacking Classification and Prediction (NSCP) algorithm based on AAL for the older people with Multi-strategy Combination based Feature Selection (MCFS) and Novel Clustering Aggregation (NCA) algorithms. …”
Get full text
-
20
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
Published 2015“…All the approach components and algorithms realizing the proposed analysis semantics have been implemented in one development framework. …”
Get full text
Get full text
Get full text
article