Search alternatives:
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
-
61
-
62
-
63
Capturing outline of fonts using genetic algorithm and splines
Published 2001“…Some examples are given to show the results obtained from the algorithm…”
Get full text
Get full text
article -
64
-
65
Evaluation of C-arm CT metal artifact reduction algorithm during intra-aneurysmal coil embolization
Published 2016“…This analysis was carried out to assess the improvements in both brain parenchyma and device visibility with MAR algorithm. Further, ground truth reference images from phantom experiments and clinical data were used for accurate assessment. …”
Get full text
Get full text
Get full text
Get full text
article -
66
Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation
Published 2022“…We describe our differentially-private model with flexible constraints and a dynamic window algorithm to maintain the privacy-budget loss in infinitely generated time-series data. …”
-
67
-
68
Modified Elite Opposition-Based Artificial Hummingbird Algorithm for Designing FOPID Controlled Cruise Control System
Published 2023“…This study proposes a novel approach for designing a fractional order proportional-integral-derivative (FOPID) controller that utilizes a modified elite opposition-based artificial hummingbird algorithm (m-AHA) for optimal parameter tuning. …”
Get full text
-
69
A method for data path synthesis using neural networks
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
70
Indexing Arabic texts using association rule data mining
Published 2019“…The model denotes extracting new relevant words by relating those chosen by previous classical methods to new words using data mining rules. Design/methodology/approach The proposed model uses an association rule algorithm for extracting frequent sets containing related items – to extract relationships between words in the texts to be indexed with words from texts that belong to the same category. …”
Get full text
Get full text
Get full text
Get full text
article -
71
Using genetic algorithms to optimize software quality estimation models
Published 2004“…In the first approach, we assume the existence of several models, and we use a genetic algorithm to combine them, and adapt them to a given data set. …”
Get full text
Get full text
Get full text
masterThesis -
72
-
73
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
Published 2022“…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
-
74
Correlation Clustering via s-Club Cluster Edge Deletion
Published 2023“…We run these algorithms and cross-compare the three experiment results to the fastest Cluster Editing algorithm which runs in O(1.62k) time. …”
Get full text
Get full text
Get full text
masterThesis -
75
An efficient approach for textual data classification using deep learning
Published 2022“…<p dir="ltr">Text categorization is an effective activity that can be accomplished using a variety of classification algorithms. In machine learning, the classifier is built by learning the features of categories from a set of preset training data. …”
-
76
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…The method used in this research is a classification of models and algorithms used in data mining. …”
Get full text
-
77
A Graph Heuristic Approach for the Data Path Allocation Problem
Published 2022Get full text
Get full text
Get full text
masterThesis -
78
Data Embedding in HEVC Video by Modifying the Partitioning of Coding Units
Published 2019“…The flags pertaining to 16x16 sub CUs are used as a cover for data embedding, where 6 or 4 message bits are embedded per CU. …”
Get full text
article -
79
-
80
Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las...
Published 2020“…A library of possible mother wavelets was designed based on the experimental data. As the inci dent wave for each sensing point varies because of the physical condition of the rail surface and the laser excitation, the algorithm automatically picks the mother wavelet from the library that generates the lar gest absolute cross-correlation with the incident wave. …”
Get full text