بدائل البحث:
using algorithms » cosine algorithm (توسيع البحث)
data algorithms » jaya algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
element » elements (توسيع البحث)
using algorithms » cosine algorithm (توسيع البحث)
data algorithms » jaya algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
element » elements (توسيع البحث)
-
1
-
2
Predicting Dropouts among a Homogeneous Population using a Data Mining Approach
منشور في 2019"…Our research relies solely on pre-college and college performance data available in the institutional database. Our research reveals that the Gradient Boosted Trees is a robust algorithm that predicts dropouts with an accuracy of 79.31% and AUC of 88.4% using only pre-enrollment data. …"
احصل على النص الكامل
-
3
Recent Advances of Chimp Optimization Algorithm: Variants and Applications
منشور في 2023"…Chimp Optimization Algorithm (ChOA) is one of the recent metaheuristics swarm intelligence methods. …"
احصل على النص الكامل
-
4
Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm
منشور في 2022"…Researchers have scrutinized data hiding schemes in recent years. Data hiding in standard images works well, but does not provide satisfactory results in distortion-sensitive medical, military, or forensic images. …"
احصل على النص الكامل
-
5
-
6
-
7
XBeGene: Scalable XML Documents Generator by Example Based on Real Data
منشور في 2012"…Inspired by the query-by-example paradigm in information retrieval, Our generator system i)allows the user to provide her own sample XML documents as input, ii) analyzes the structure, occurrence frequencies, and content distributions for each XML element in the user input documents, and iii) produces synthetic XML documents which closely concur, in both structural and content features, to the user's input data. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
8
-
9
-
10
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
منشور في 2022"…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …"
-
11
An enhanced quorum selection algorithm
منشور في 2009احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
12
An Improved Quorum Selection Algorithm
منشور في 2008احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
13
Efficient Approximate Conformance Checking Using Trie Data Structures
منشور في 2021"…By encoding the proxy behavior using a trie data structure, we obtain a logarithmically reduced search space for alignment computation compared to a set-based representation. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
14
-
15
-
16
Allocation and re-allocation of data in a grid using an adaptive genetic algorithm
منشور في 2006"…Allocation and re-allocation of data in a grid using an adaptive genetic algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
17
Bee Colony Algorithm for Proctors Assignment.
منشور في 2015"…The Bee Colony algorithm is a recent population-based search algorithm that mimics the natural behavior of swarms of honey bees during the process of collecting food. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
18
-
19
-
20