Search alternatives:
would algorithm » mould algorithm (Expand Search)
box algorithm » rd algorithm (Expand Search)
update » updated (Expand Search)
Showing 1 - 20 results of 40 for search '(( data would algorithm ) OR ((( develop box algorithm ) OR ( elements update algorithm ))))', query time: 0.12s Refine Results
  1. 1

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment by Zakaria Tolba (16904718)

    Published 2022
    “…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
  2. 2

    Allocating data to multicomputer nodes by physical optimization algorithms for loosely synchronous computations by Mansour, Nashat

    Published 1992
    “…Three optimization methods derived from natural sciences are considered for allocating data to multicomputer nodes. These are simulated annealing, genetic algorithms and neural networks. …”
    Get full text
    Get full text
    Get full text
    article
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    GenDE: A CRF-Based Data Extractor by Kayed, Mohammed

    Published 2020
    “…Web site schema detection and data extraction from the Deep Web have been studied a lot. …”
    Get full text
    Get full text
  9. 9

    Multi-marker-LD based genetic algorithm for tag SNP selection by Mansour, Nashat

    Published 2014
    “…The performance of the three algorithms are compared with those of a recognized tag SNP selection algorithm using three different real data sets from the HapMap project. …”
    Get full text
    Get full text
    Get full text
    article
  10. 10

    Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection by HAMDALLAH, KHALID WAJIH TURKI

    Published 2011
    “…In order to analyze the performance of machine learning algorithms, data was provided by a bank to be used for educational purposes and shall remain undisclosed. …”
    Get full text
  11. 11
  12. 12
  13. 13

    Stochastic management of hybrid AC/DC microgrids considering electric vehicles charging demands by Peng, Wang

    Published 2020
    “…No doubt that the random and volatile charging demand of these devices would affect the power grid optimal operation and scheduling which may be regarded as a new challenge. …”
    Get full text
    Get full text
    Get full text
    article
  14. 14

    A Fuzzy Low-Dimensional Intersection Graph Representation Approach for Graph Compression and Anonymization by Yamout, Youssef

    Published 2021
    “…The large amount of data represented as a network, or graph, sometimes exceeds the resources of a conventional computing device. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  15. 15
  16. 16

    Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE by Mathew, Elezabeth

    Published 2020
    “…Various descriptive, diagnostic, predictive, and prescriptive analysis is done on the e-procurement data. The deep learning model developed can perform thousands of routine and, repetitive tasks within a fairly short period compared to what it would take for a human being without any compromise on the quality of work. …”
    Get full text
  17. 17
  18. 18

    Intelligent Bilateral Client Selection in Federated Learning Using Game Theory by Wehbi, Osama

    Published 2022
    “…Adopting a random selection strategy would entail substantial problems due to the heterogeneity in terms of data quality, and computational and communication resources across the participants. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  19. 19
  20. 20