Search alternatives:
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
-
1
UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data
Published 2024“…UniBFS exploits the inherent characteristic of binary algorithms-binary coding-to search the entire problem space for identifying relevant features while avoiding irrelevant ones. …”
-
2
Axes-Based Encryption Key
Published 2018Get full text
Get full text
Get full text
Get full text
conferenceObject -
3
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
Published 2023“…<p dir="ltr">There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. …”
-
4
A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes
Published 2022“…<p>We have proposed a robust, secure and efficient image encryption algorithm based on chaotic maps and algebraic structure. …”
-
5
Data Embedding in HEVC Video by Modifying the Partitioning of Coding Units
Published 2019Subjects: Get full text
article -
6
-
7
-
8
-
9
Development of an Optimization Algorithm for Internet Data Traffic
Published 2020“…The algorithm monitors data repetitions in IP datagram and prepares a compression code in response of this repetition. …”
Get full text
article -
10
-
11
Variable Selection in Data Analysis: A Synthetic Data Toolkit
Published 2024“…Variable (feature) selection plays an important role in data analysis and mathematical modeling. This paper aims to address the significant lack of formal evaluation benchmarks for feature selection algorithms (FSAs). …”
Get full text
article -
12
Practical single node failure recovery using fractional repetition codes in data centers
Published 2016“…FR codes consist of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
13
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
Published 2005Get full text
Get full text
Get full text
Get full text
conferenceObject -
14
-
15
A hybrid cryptosystem based on WEP for 802.11 networks. (c2006)
Published 2006Get full text
Get full text
masterThesis -
16
A Comparative Study of Elgamal Based Cryptographic Algorithms
Published 2004Get full text
Get full text
Get full text
conferenceObject -
17
-
18
Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators
Published 2021“…The outcomes of the DNA microarray is a table/matrix, called gene expression data. Pattern recognition algorithms are widely applied to gene expression data to differentiate between health and cancerous patient samples. …”
Get full text
-
19
Auto-indexing Arabic texts based on association rule data mining. (c2015)
Published 2015“…Our model denotes extracting new relevant words by relating those chosen by the previous classical methods, to new words using data mining rules. …”
Get full text
Get full text
masterThesis -
20
Estimating Construction Project Duration Using a Machine Learning Algorithm
Published 2024Get full text
Get full text
Get full text
masterThesis