بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
deer algorithm » search algorithm (توسيع البحث)
element deer » elementi per (توسيع البحث)
يعرض 181 - 200 نتائج من 902 نتيجة بحث عن '(((( data using algorithm ) OR ( tests using algorithm ))) OR ( element deer algorithm ))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 181
  2. 182

    Efficient Seismic Volume Compression using the Lifting Scheme حسب Khene, M. F.

    منشور في 2000
    "…As the approximation coefficients represent a smooth low-resolution version of the input data they are only quantized using a uniform scalar quantizer (USQ). …"
    احصل على النص الكامل
    article
  3. 183
  4. 184

    A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks حسب Umesh Kumar Lilhore (17727684)

    منشور في 2022
    "…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …"
  5. 185

    Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques حسب Ameema Zainab (16864263)

    منشور في 2020
    "…The obtained results illustrate the efficacy of the proposed algorithm to analyze the time series data from the IoT devices for spam detection.…"
  6. 186
  7. 187
  8. 188
  9. 189

    BUC algorithm for iceberg cubes حسب Nasr, George E.

    منشور في 2003
    "…The Uniform distribution is used as a basis for comparison. Results show that when the cube is sparse there is a correlation between the data distribution and the running time of the algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  10. 190
  11. 191
  12. 192
  13. 193

    Scheduling and allocation in high-level synthesis using stochastic techniques حسب Sait, Sadiq M.

    منشور في 2020
    "…In this work, a unique approach to scheduling and allocation problem using the genetic algorithm (GA) is described. This approach is different from a previous attempt using GA (Wehn et al., IFIP Working Conference on Logic and Architecture Synthesis, Paris, 1990, pp. 47–56) in many respects. …"
    احصل على النص الكامل
    article
  14. 194
  15. 195
  16. 196
  17. 197
  18. 198

    The use of multi-task learning in cybersecurity applications: a systematic literature review حسب Shimaa Ibrahim (22155739)

    منشور في 2024
    "…Five critical applications, such as network intrusion detection and malware detection, were identified, and several tasks used in these applications were observed. Most of the studies used supervised learning algorithms, and there were very limited studies that focused on other types of machine learning. …"
  19. 199

    Extreme Early Image Recognition Using Event-Based Vision حسب Abubakar Abubakar (18278998)

    منشور في 2023
    "…Our collected event-based dataset using CeleX imager and five public event-based datasets are used to prove this concept, and the testing metrics reflect how early the neural network (NN) detects an image before the full-frame image is captured. …"
  20. 200

    Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT حسب Arumugam K (18456690)

    منشور في 2021
    "…This paper proposes an Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT. …"