Search alternatives:
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
data finding » data mining (Expand Search), data hiding (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
data finding » data mining (Expand Search), data hiding (Expand Search)
-
181
Android Malware Detection Using Machine Learning
Published 2024“…Detecting and preventing malware is crucial for several reasons, including the security of personal information, data loss and tampering, system disruptions, financial losses, and reputation damage. …”
Get full text
article -
182
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
Published 2022“…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
-
183
Delay Optimization in LoRaWAN by Employing Adaptive Scheduling Algorithm With Unsupervised Learning
Published 2023“…This paper aims to optimize the delay in LoRaWAN by using an Adaptive Scheduling Algorithm (ASA) with an unsupervised probabilistic approach called Gaussian Mixture Model (GMM). …”
-
184
-
185
-
186
Graph Contraction for Mapping Data on Parallel Computers
Published 1994“…We then present experimental results on using contracted graphs as inputs to two physical optimization methods; namely, genetic algorithm and simulated annealing. …”
Get full text
Get full text
Get full text
article -
187
Mapping realistic data sets on parallel computers
Published 1993“…The GC algorithm allows large-scale mapping to become efficient, especially when slow but high-quality mappers are used.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
188
-
189
A SIMULATED ANNEALING ALGORITHM FOR THE CLUSTERING PROBLEM
Published 2020“…We also find optimal parameters values for a specific class of data sets and give recommendations on the choice of parameters for general data sets. …”
Get full text
article -
190
Particle swarm optimization algorithm: review and applications
Published 2024“…The main procedure of the PSO algorithm is presented. Future researchers can use the collected data in this survey as baseline information on the PSO and PSO's applications.…”
Get full text
-
191
New enumeration algorithm for regular boolean functions
Published 2018“…This algorithm exploits the equivalence between regular Boolean functions and positive threshold functions that can be used to represent instances of the knapsack problem. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
192
-
193
A Hybrid Fault Detection and Diagnosis of Grid-Tied PV Systems: Enhanced Random Forest Classifier Using Data Reduction and Interval-Valued Representation
Published 2021“…The proposed approach deals with system uncertainties (current/voltage variability, noise, measurement errors, ⋯) by using an interval-valued data representation, and with large-scale systems by using a dataset size-reduction framework. …”
-
194
An Effective Hybrid NARX-LSTM Model for Point and Interval PV Power Forecasting
Published 2021“…First, the NARXNN model acquires the data to generate a residual error vector. Then, the stacked LSTM model, optimized by Tabu search algorithm, uses the residual error correction associated with the original data to produce a point and interval PVPF. …”
-
195
-
196
Convergence behavior of the normalized least mean fourth algorithm
Published 2000“…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …”
Get full text
Get full text
article -
197
Evolutionary algorithm for predicting all-atom protein structure
Published 2011“…We present an improved version of a scatter search (SS) algorithm for predicting all-atoms protein structures using a recent energy model. …”
Get full text
Get full text
Get full text
conferenceObject -
198
GenDE: A CRF-Based Data Extractor
Published 2020“…If the wrapper failed to work with the new page, a new wrapper/schema would be re-generated by calling an unsupervised wrapper induction system. In this paper, a new data extractor called GenDE is proposed. It verifies the site schema and extracts data from the Web pages using Conditional Random Fields (CRFs). …”
Get full text
Get full text
-
199
Three-phase simulated annealing algorithms for exam scheduling
Published 2003“…We empirically compare 3PSA with a 4-phase clustering-based heuristic algorithm using realistic data. Our experimental results show that 3PSA produces good exam schedules, which are better than those of the clustering heuristic procedure.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
200
Recent Advances of Chimp Optimization Algorithm: Variants and Applications
Published 2023“…Chimp Optimization Algorithm (ChOA) is one of the recent metaheuristics swarm intelligence methods. …”
Get full text