Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
-
41
A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining
Published 2021“…Second, an up-to-date overview of the IoT cybersecurity standards landscape has been mapped by combining existing overviews. Third, a text mining algorithm has been implemented. Fourth, the systematic approach has been modeled using business process modeling notation. …”
-
42
Bee Colony Algorithm for Proctors Assignment.
Published 2015“…The Bee Colony algorithm is a recent population-based search algorithm that mimics the natural behavior of swarms of honey bees during the process of collecting food. …”
Get full text
Get full text
Get full text
article -
43
-
44
Fast Text Classification using Lean Gradient Descent Feed Forward Neural Network for Category Feature Augmentation
Published 2024“…Text classification is a key task of the Natural Language Processing (NLP) field that aims at assigning predefined categories to textual documents. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
45
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
Published 2022“…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
-
46
A kernelization algorithm for d-Hitting Set
Published 2010“…For 3-Hitting Set, an arbitrary instance is reduced into an equivalent one that contains at most 5k2+k elements. This kernelization is an improvement over previously known methods that guarantee cubic-order kernels. …”
Get full text
Get full text
Get full text
article -
47
An improved quorum selection algorithm (IQSA). (c2007)
Published 2007Get full text
Get full text
masterThesis -
48
Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements
Published 2023“…<p dir="ltr">This work proposes an original preconditioner that couples the Constrained Pressure Residual (CPR) method with block preconditioning for the efficient solution of the linearized systems of equations arising from fully implicit multiphase flow models. …”
-
49
Evolutionary algorithm for predicting all-atom protein structure
Published 2011“…We present an improved version of a scatter search (SS) algorithm for predicting all-atoms protein structures using a recent energy model. …”
Get full text
Get full text
Get full text
conferenceObject -
50
Intelligent Rapidly-Exploring Random Tree Star Algorithm
Published 2024Get full text
doctoralThesis -
51
-
52
The effects of data balancing approaches: A case study
Published 2023“…<p dir="ltr">Imbalanced datasets affect the performance of machine learning algorithms adversely. To cope with this problem, several resampling methods have been developed recently. …”
-
53
-
54
Bee colony algorithm for assigning proctors to exams. (c2013)
Published 2013Get full text
Get full text
masterThesis -
55
-
56
Evolutionary algorithms for state justification in sequential automatic test pattern generation
Published 2005“…A common search operation in sequential Automatic Test Pattern Generation is to justify a desired state assignment on the sequential elements. State justification using deterministic algorithms is a difficult problem and is prone to many backtracks, which can lead to high execution times. …”
Get full text
article -
57
A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques
Published 2022“…We study the key research areas in phishing email detection using NLP, machine learning algorithms used in phishing detection email, text features in phishing emails, datasets and resources that have been used in phishing emails, and the evaluation criteria. …”
Get full text
Get full text
-
58
Sentiment analysis for Arabizi in social media. (c2015)
Published 2015“…Informal Arabic lacks standardization and has no grammar, thus sentimental analysis in this area is considered a complex process. Sentiment Analysis for Arabic has been studied for MSA (Modern Standard Arabic) but rarely for informal Arabic, and non-existent for Arabizi; whereas most of the youth in Lebanon text in Arabizi claiming that it is easier than texting in Arabic. …”
Get full text
Get full text
masterThesis -
59
The buffered work-pool approach for search-tree based optimization algorithms
Published 2017“…Recent advances in algorithm design have shown a growing interest in seeking exact solutions to many hard problems. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
60
An enhanced k-means clustering algorithm for pattern discovery in healthcare data
Published 2015“…The huge amounts of data generated by media sensors in health monitoring systems, by medical diagnosis that produce media (audio, video, image, and text) content, and from health service providers are too complex and voluminous to be processed and analyzed by traditional methods. …”
Get full text
Get full text
Get full text
Get full text
article