Search alternatives:
encoding algorithm » cosine algorithm (Expand Search)
hiding algorithm » scheduling algorithm (Expand Search), cosine algorithm (Expand Search)
data hiding » data mining (Expand Search)
element » elements (Expand Search)
search » research (Expand Search)
encoding algorithm » cosine algorithm (Expand Search)
hiding algorithm » scheduling algorithm (Expand Search), cosine algorithm (Expand Search)
data hiding » data mining (Expand Search)
element » elements (Expand Search)
search » research (Expand Search)
-
1
Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm
Published 2022“…Researchers have scrutinized data hiding schemes in recent years. Data hiding in standard images works well, but does not provide satisfactory results in distortion-sensitive medical, military, or forensic images. …”
Get full text
-
2
Efficient Approximate Conformance Checking Using Trie Data Structures
Published 2021Subjects: “…Estimation error,Runtime,Computational modeling,Data structures,Approximation algorithms,Encoding,Computational efficiency…”
Get full text
Get full text
Get full text
-
3
-
4
The unified effect of data encoding, ansatz expressibility and entanglement on the trainability of HQNNs
Published 2023“…We focus on the combined influence of data encoding, qubit entanglement, and ansatz expressibility in hybrid quantum neural networks (HQNNs) for multi-class classification tasks. …”
-
5
Extended Behavioral Modeling of FET and Lattice-Mismatched HEMT Devices
Published 2016Subjects: Get full text
doctoralThesis -
6
On the Optimization of Band Gaps in Periodic Waveguides
Published 2025“…<h3 dir="ltr">Purpose</h3><p dir="ltr">This work applies a computational framework for vibration attenuation in periodic structures by combining the established wave and finite element (WFE) method with nature-inspired optimization algorithms. …”
-
7
A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks
Published 2022“…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …”
-
8
Adaptive bias simulated evolution algorithm for placement
Published 2001“…This parameter has major impact on the algorithm run-time and the quality of the solution subspace searched. …”
Get full text
Get full text
article -
9
Fuzzy simulated evolution algorithm for topology design of campusnetworks
Published 2000“…To diversify the search, we have also incorporated tabu search-based characteristics in the allocation phase of the SE algorithm. …”
Get full text
Get full text
article -
10
A FUZZY EVOLUTIONARY ALGORITHM FOR TOPOLOGY DESIGN OF CAMPUS NETWORKS
Published 2020“…To intensify the search, we have also incorporated Tabu Search-based characteristics in the allocation phase of the SE algorithm. …”
Get full text
article -
11
Evolutionary algorithms for state justification in sequential automatic test pattern generation
Published 2005“…Evolutionary algorithms have been effective in solving many search and optimization problems. …”
Get full text
article -
12
Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm
Published 2022“…The antecedent part parameters (Gaussian membership function parameters) are encoded as a population of artificial swarm of grasshoppers and optimized using its algorithm. …”
-
13
-
14
Socially Motivated Approach to Simulate Negotiation Process
Published 2014Get full text
doctoralThesis -
15
Autonomous Demand-Side Management in the Future Smart Grid
Published 2016Get full text
doctoralThesis -
16
Bird’s Eye View feature selection for high-dimensional data
Published 2023“…BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …”
-
17
A Fuzzy Low-Dimensional Intersection Graph Representation Approach for Graph Compression and Anonymization
Published 2021“…The large amount of data represented as a network, or graph, sometimes exceeds the resources of a conventional computing device. …”
Get full text
Get full text
Get full text
masterThesis -
18
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
Published 2024“…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …”
-
19
Optimization of Commercially Off the Shelf (COTS) Electric Propulsion System for Low Speed Fuel Cell UAV
Published 2013Get full text
doctoralThesis -
20
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
Get full text