Showing 1 - 20 results of 110 for search '(( relevant study algorithm ) OR ((( data code algorithm ) OR ( data backing algorithm ))))', query time: 0.11s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data by Behrouz Ahadzadeh (19757022)

    Published 2024
    “…UniBFS exploits the inherent characteristic of binary algorithms-binary coding-to search the entire problem space for identifying relevant features while avoiding irrelevant ones. …”
  5. 5
  6. 6

    Development of an Optimization Algorithm for Internet Data Traffic by Misbahuddin, Syed

    Published 2020
    “…The algorithm monitors data repetitions in IP datagram and prepares a compression code in response of this repetition. …”
    Get full text
    article
  7. 7
  8. 8

    Practical single node failure recovery using fractional repetition codes in data centers by Itani, May

    Published 2016
    “…FR codes consist of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 9

    Large language models for code completion: A systematic literature review by Rasha Ahmad Husein (19744756)

    Published 2024
    “…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. While several research papers have focused on the use of LLMs for code completion, these studies are fragmented, and there is no systematic overview of the use of LLMs for code completion. …”
  10. 10

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models by Osama Bassam J. Rabie (21323741)

    Published 2024
    “…Then, the DRF optimization algorithm is applied to optimally tune the features required for accurate intrusion detection and classification. …”
  11. 11
  12. 12

    A Hash-Based Assessment and Recovery Algorithm for Distributed Healthcare Systems Using Blockchain Technology by Jaber, Mohammad

    Published 2020
    “…Here rises the need for an algorithm that can assess the damage that occurred before recovering the database back to its consistent state. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  13. 13
  14. 14
  15. 15
  16. 16

    A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks by Umesh Kumar Lilhore (17727684)

    Published 2022
    “…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …”
  17. 17
  18. 18

    Oversampling techniques for imbalanced data in regression by Samir Brahim Belhaouari (9427347)

    Published 2024
    “…For such high-dimension data our approach outperforms the Synthetic Minority Oversampling Technique for Regression (SMOTER) algorithm for the IMDB-WIKI and AgeDB image datasets. …”
  19. 19

    Assessment of network module identification across complex diseases by Sarvenaz Choobdar (18602821)

    Published 2019
    “…Predicted network modules were tested for association with complex traits and diseases using a unique collection of 180 genome-wide association studies. Our robust assessment of 75 module identification methods reveals top-performing algorithms, which recover complementary trait-associated modules. …”
  20. 20