يعرض 1 - 20 نتائج من 67 نتيجة بحث عن '(((( data encoding algorithm ) OR ( data backing algorithm ))) OR ( elements research algorithm ))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 1
  2. 2

    Efficient Approximate Conformance Checking Using Trie Data Structures حسب Awad, Ahmed

    منشور في 2021
    الموضوعات: "…Estimation error,Runtime,Computational modeling,Data structures,Approximation algorithms,Encoding,Computational efficiency…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  3. 3
  4. 4

    The unified effect of data encoding, ansatz expressibility and entanglement on the trainability of HQNNs حسب Muhammad Kashif (3923483)

    منشور في 2023
    "…We focus on the combined influence of data encoding, qubit entanglement, and ansatz expressibility in hybrid quantum neural networks (HQNNs) for multi-class classification tasks. …"
  5. 5

    A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks حسب Umesh Kumar Lilhore (17727684)

    منشور في 2022
    "…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …"
  6. 6
  7. 7

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models حسب Osama Bassam J. Rabie (21323741)

    منشور في 2024
    "…Then, the DRF optimization algorithm is applied to optimally tune the features required for accurate intrusion detection and classification. …"
  8. 8

    A Hash-Based Assessment and Recovery Algorithm for Distributed Healthcare Systems Using Blockchain Technology حسب Jaber, Mohammad

    منشور في 2020
    "…Here rises the need for an algorithm that can assess the damage that occurred before recovering the database back to its consistent state. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  9. 9

    Incorporation of Robust Sliding Mode Control and Adaptive Multi-Layer Neural Network-Based Observer for Unmanned Aerial Vehicles حسب Zainab Akhtar (15192184)

    منشور في 2024
    "…The MLNN observer, employing a modified back-propagation algorithm, is used for the quadrotor’s state estimation. …"
  10. 10
  11. 11

    Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements حسب Stefano Nardean (14151900)

    منشور في 2023
    "…Therefore, we designed a dedicated two-stage strategy, inspired by the CPR algorithm, where a block preconditioner is used for the pressure part with the aim at exploiting the inner $$2\times 2$$ 2 × 2 structure. …"
  12. 12

    A hybrid graph representation for recursive backtracking algorithms حسب Abu-Khzam, Faisal N.

    منشور في 2017
    "…The use of efficient data structures is necessary for fast graph modification modules as well as fast take-back procedures. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  13. 13
  14. 14

    The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions حسب Abdulmalik Alwarafy (17984104)

    منشور في 2022
    "…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …"
  15. 15

    Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm حسب Saima Hassan (14918003)

    منشور في 2022
    "…The antecedent part parameters (Gaussian membership function parameters) are encoded as a population of artificial swarm of grasshoppers and optimized using its algorithm. …"
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    Information reconciliation through agent controlled graph model. (c2018) حسب Saba, Rita

    منشور في 2018
    "…Even though prevention techniques exist, they’re not enough to fully secure the data from malicious activities. Thus, the need for a detection and recovery algorithm to assess the damage and bring the database back to its consistent state in case of an attack. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis