Showing 41 - 60 results of 165 for search '(((( complement cc3d algorithm ) OR ( experiment 2 algorithm ))) OR ( level coding algorithm ))', query time: 0.11s Refine Results
  1. 41

    Mixed precision iterative refinement with adaptive precision sparse approximate inverse preconditioning by Noaman Khan (19810050)

    Published 2025
    “…<p dir="ltr">Hardware trends have motivated the development of mixed precision algorithms in numerical linear algebra, which aim to decrease runtime while maintaining acceptable accuracy. …”
  2. 42

    A clustering metaheuristic for large orienteering problems by Almiqdad Elzein (13141038)

    Published 2022
    “…We have validated the effectiveness of the proposed metaheuristic design through a set of computational experiments. In particular, using a state-of-the-art heuristic and an exact algorithm, we have shown that it is significantly beneficial to use the Orienteering Problem algorithm plugged into our metaheuristic, as opposed to using it as a standalone algorithm. …”
  3. 43

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…The objective of this thesis is to propose a methodology to apply ensembling in the detection of infected hosts considering these two aspects. As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …”
    Get full text
  4. 44

    A Modified Oppositional Chaotic Local Search Strategy Based Aquila Optimizer to Design an Effective Controller for Vehicle Cruise Control System by Ekinci, Serdar

    Published 2023
    “…We also propose a simple yet effective objective function to increase the performance of the proposed algorithm (CmOBL-AO) to adjust the real PIDD2 controller's parameters effectively. …”
    Get full text
  5. 45

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment by Zakaria Tolba (16904718)

    Published 2022
    “…On the other hand, the transfer learning skills demonstrated in this study indicate that discovering suitable testing models from the ground is also achievable using our model with optimum prior cryptographic expertise, where we contribute the results of deep learning in the field of deep learning based differential cryptanalysis development.Various experiments were performed on discrete and continuous chaotic and non-chaotic permutation patterns, and the best-performing model had an MSE of 1.8217e−04 and an R2 of 1, demonstrating the practicality of the suggested technique.…”
  6. 46
  7. 47
  8. 48

    Oversampling techniques for imbalanced data in regression by Samir Brahim Belhaouari (9427347)

    Published 2024
    “…Access to the comparative code can be found in GitHub.</p><h2>Other Information</h2> <p> Published in: Expert Systems with Applications<br> License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1016/j.eswa.2024.124118" target="_blank">https://dx.doi.org/10.1016/j.eswa.2024.124118</a></p>…”
  9. 49

    Severity-Based Prioritized Processing of Packets with Application in VANETs by Ala Al-Fuqaha (4434340)

    Published 2019
    “…In this study, we propose a generic prioritization and resource management algorithm that can be used to prioritize processing of received packets in vehicular networks. …”
  10. 50

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology by Al-Hemairy, Moh'd Hussain

    Published 2010
    “…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
    Get full text
  11. 51
  12. 52

    An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System by Alkhatib, Osama

    Published 2019
    “…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. Experiment is performed using Azure Machine Learning (ML) platform to test and assess the most efficient model that would predict the failure of system elements and predict the abnormality of the operation. …”
    Get full text
  13. 53

    Color edge enhancement based fuzzy segmentation of license plates by Syed, Y.A.

    Published 2005
    “…The combined rate for the two phases of our license plate identification algorithm is 94.24%.…”
    Get full text
    Get full text
    article
  14. 54

    Efficient Seismic Volume Compression using the Lifting Scheme by Khene, M. F.

    Published 2000
    “…Finally a runlength plus a Huffman encoding are applied for binary coding of the quantized coefficients.…”
    Get full text
    article
  15. 55
  16. 56
  17. 57
  18. 58

    MSLP: mRNA subcellular localization predictor based on machine learning techniques by Saleh Musleh (15279190)

    Published 2023
    “…Datasets, the code of API and the Docker are shared for the community in GitHub at: https://github.com/smusleh/MSLP.</p><h2>Other Information</h2><p dir="ltr">Published in: BMC Bioinformatics<br>License: <a href="https://creativecommons.org/licenses/by/4.0" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1186/s12859-023-05232-0" target="_blank">https://dx.doi.org/10.1186/s12859-023-05232-0</a></p>…”
  19. 59

    Defining quantitative rules for identifying influential researchers: Insights from mathematics domain by Ghulam Mustafa (458105)

    Published 2024
    “…The rules were developed for each parameter category using the Decision Tree Algorithm, which achieved an average accuracy of 70 to 75 percent for identifying awardees in mathematics domains. …”
  20. 60