Search alternatives:
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
Showing 261 - 280 results of 1,059 for search '(((( data using algorithm ) OR ( problem using algorithm ))) OR ( element network algorithm ))', query time: 0.13s Refine Results
  1. 261
  2. 262

    The use of multi-task learning in cybersecurity applications: a systematic literature review by Shimaa Ibrahim (22155739)

    Published 2024
    “…Five critical applications, such as network intrusion detection and malware detection, were identified, and several tasks used in these applications were observed. Most of the studies used supervised learning algorithms, and there were very limited studies that focused on other types of machine learning. …”
  3. 263

    A multiobjective optimization method for the SOC Test Time, TAM, and power optimization using a strength pareto evolutionary algorithm by Harmanani, Haidar M.

    Published 2017
    “…This paper presents a multiobjective optimization approach for the SOC test scheduling problem. The method uses a Strength Pareto Evolutionary Algorithm that minimizes the overall test application time in addition to power, wrapper design and TAM assignment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  4. 264

    The monotone circuit value problem with bounded genus is in NC by Abu-Khzam, Faisal N.

    Published 2017
    “…We present an efficient parallel algorithm for the general Monotone Circuit Value Problem (MCVP) with n gates and an underlying graph of bounded genus k. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  5. 265
  6. 266

    Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT by Arumugam K (18456690)

    Published 2021
    “…This paper proposes an Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT. …”
  7. 267

    Optimum sensors allocation for drones multi-target tracking under complex environment using improved prairie dog optimization by Abu Zitar, Raed

    Published 2024
    “…The IPDOA performance was compared with the other 8 metaheuristic optimization algorithms and the testing showed its superiority over those techniques for solving this complex problem. …”
    Get full text
  8. 268
  9. 269

    A Novel Big Data Classification Technique for Healthcare Application Using Support Vector Machine, Random Forest and J48 by Al-Manaseer, Hitham

    Published 2022
    “…The performance of the algorithms for accuracy was evaluated using the Healthcare (heart attack possibility) dataset, freely available on kagle. …”
    Get full text
  10. 270

    QU-GM: An IoT Based Glucose Monitoring System From Photoplethysmography, Blood Pressure, and Demographic Data Using Machine Learning by Md Nazmul Islam Shuzan (21842426)

    Published 2024
    “…We collected PPG signals, demographic information, and blood pressure data from 139 diabetic (49.65%) and non-diabetic (50.35%) subjects. …”
  11. 271

    Squirrel Search Algorithm for Portfolio Optimization by Dhaini, Mahdi

    Published 2019
    “…However, the successes of nature-inspired algorithms in hard computational optimization problems have encouraged researchers to design and apply these algorithms for a variety of optimization problems. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  12. 272

    Enhancing Breast Cancer Diagnosis With Bidirectional Recurrent Neural Networks: A Novel Approach for Histopathological Image Multi-Classification by Rajendra Babu Chikkala (22330876)

    Published 2025
    “…In this study, we introduce an innovative method for the multi-classification of breast cancer histopathological images utilizing Bidirectional Recurrent Neural Networks (BRNN). The BRNN structure consists of four unique elements: the backbone branch for transfer learning, the Gated Recurrent Unit (GRU), the residual collaborative branch, and the feature fusion module. …”
  13. 273

    A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems by Faria Nawshin (21841598)

    Published 2025
    “…<p dir="ltr">Federated Learning (FL) is gaining traction in Android-based consumer electronics, enabling collaborative model training across decentralized devices while preserving data privacy. However, the increasing adoption of FL in these devices exposes them to adversarial attacks that can compromise user data and device security. …”
  14. 274

    Evolutionary Algorithms for VLSIMultiobjective Netlist Partitioning by Sait, Sadiq M.

    Published 2006
    “…A series of experiments are performed to evaluate the efficiency of the algorithms. ISCAS-85/89 benchmark circuits are used and experimental results are reported and analyzed to compare the performance of GA, TS and SimE. …”
    Get full text
    article
  15. 275
  16. 276
  17. 277

    Improvement Algorithm for Limited Space Scheduling by Zouein, Pierrette

    Published 2001
    “…This paper addresses the combined problem termed “space scheduling” and presents an algorithmic time-space trade-off model for adjusting activity durations and start dates to decrease the need for space over congested time periods. …”
    Get full text
    Get full text
    article
  18. 278

    Predicting Plasma Vitamin C Using Machine Learning by Daniel Kirk (17302798)

    Published 2022
    “…The objective of this study is to predict plasma vitamin C using machine learning. The NHANES dataset was used to predict plasma vitamin C in a cohort of 2952 American adults using regression algorithms and clustering in a way that a hypothetical health application might. …”
  19. 279
  20. 280

    Robust Control Of Sampled Data Systems by AL-Sunni, Fouad

    Published 2020
    “…They then present a numerical controller design algorithm based on the derived bounds. Examples are used for demonstration.…”
    Get full text
    article