بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
testing algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
data testing » data using (توسيع البحث)
element » elements (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
testing algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
data testing » data using (توسيع البحث)
element » elements (توسيع البحث)
-
41
-
42
Test time minimization for system-on-chip with test bus assignment and sizin
منشور في 2017"…Test access mechanism (TAM) is responsible for test data transport and is characterized by its bandwidth capacity. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
43
-
44
-
45
Methodology for Analyzing the Traditional Algorithms Performance of User Reviews Using Machine Learning Techniques
منشور في 2020"…In this research, different machine-learning algorithms such as logistic regression, random forest and naïve Bayes were tuned and tested. …"
-
46
Matheuristic Fixed Set Search Applied to the Two-Stage Capacitated Facility Location Problem
منشور في 2025الموضوعات: -
47
-
48
Orthogonal Learning Rosenbrock’s Direct Rotation with the Gazelle Optimization Algorithm for Global Optimization
منشور في 2022"…The IGOA was compared with several other proposed meta-heuristic algorithms. Moreover, the Wilcoxon signed-rank test further assessed the experimental results to conduct more systematic data analyses. …"
احصل على النص الكامل
-
49
Regression Testing of Database Applications
منشور في 2002"…In phase 2, further reduction in the regression test cases is performed by using reduction algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
50
-
51
Improving MRI Resolution: A Cycle Consistent Generative Adversarial Network-Based Approach for 3T to 7T Translation
منشور في 2024"…Efforts are underway to develop algorithms that can generate 7T MRI from 3T MRI to achieve better image quality without the need for 7T MRI machines. …"
-
52
-
53
-
54
-
55
Unsupervised histogram based color image segmentation
منشور في 2003"…Histograms are then computed, smoothed and downsampled. A peak picking algorithm finds the predominant peaks in the histograms. …"
احصل على النص الكامل
احصل على النص الكامل
article -
56
-
57
Decision-level fusion for single-view gait recognition with various carrying and clothing conditions
منشور في 2017"…Such a system is needed in access control applications whereby a single view is imposed by the system setup. The gait data is firstly processed using three gait representation methods as the features sources; Accumulated Prediction Image (API) and two new gait representations namely; Accumulated Flow Image (AFI) and Edge-Masked Active Energy Image (EMAEI). …"
احصل على النص الكامل
article -
58
Oversampling techniques for imbalanced data in regression
منشور في 2024"…For tabular data we conducted a comprehensive experiment using various models trained on both augmented and non-augmented datasets, followed by performance comparisons on test data. …"
-
59
Unsupervised outlier detection in multidimensional data
منشور في 2022"…<p>Detection and removal of outliers in a dataset is a fundamental preprocessing task without which the analysis of the data can be misleading. Furthermore, the existence of anomalies in the data can heavily degrade the performance of machine learning algorithms. …"
-
60
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
منشور في 2022"…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …"