بدائل البحث:
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
rd algorithm » _ algorithms (توسيع البحث)
elements rd » elements _ (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
rd algorithm » _ algorithms (توسيع البحث)
elements rd » elements _ (توسيع البحث)
-
81
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
منشور في 2022"…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …"
احصل على النص الكامل
-
82
Improving MRI Resolution: A Cycle Consistent Generative Adversarial Network-Based Approach for 3T to 7T Translation
منشور في 2024"…Various CycleGAN architectures were experimented with and compared on this dataset. The best performing CycleGAN architecture successfully produced the reconstructed images with a high level of accuracy based on different quantitative and qualitative evaluation criteria. …"
-
83
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
منشور في 2022"…Finally, a 3D Finite Element simulation was conducted to validate the findings and each observation resulting from the experiments. Based on the obtained accuracy of the results, the proposed methodology has been found to be capable of inspecting rail track specimens in a completely non-contact manner with reasonably good accuracy…"
احصل على النص الكامل
-
84
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
منشور في 2022"…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …"
-
85
-
86
Recent Advances in Harris Hawks Optimization: A Comparative Study and Applications
منشور في 2022"…In this review research, we focused on the applications and developments of the recent well-established robust optimizer Harris hawk optimizer (HHO) as one of the most popular swarm-based techniques of 2020. Moreover, several experiments were carried out to prove the powerfulness and effectivness of HHO compared with nine other state-of-art algorithms using Congress on Evolutionary Computation (CEC2005) and CEC2017. …"
احصل على النص الكامل
-
87
LOCATING DAMAGES IN THIN ALUMINIUM PLATES USING LAMB WAVES AND AGENETIC OPTIMIZATION APPROACH
منشور في 2021"…A new damage localization method based on Lamb waves is presented here for thin aluminium (Al) plate specimens using a Genetic optimization (GO) approach. …"
احصل على النص الكامل
-
88
Clustering records in information retrieval systems. (c1995)
منشور في 1995احصل على النص الكامل
احصل على النص الكامل
masterThesis -
89
Turbo-charging dominating set with an FPT subroutine
منشور في 2017"…Turbo-charging is a recent algorithmic technique that is based on the fixed-parameter tractability of the dynamic versions of some problems as a way to improve heuristics. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
90
Inception voltage of corona in bipolar ionized fields-effect oncorona power loss
منشور في 1996"…In this paper, an iterative finite element based algorithm is presented as a numerical tool for the solution of the bipolar ionized field around high voltage direct current (HVDC) transmission lines. …"
احصل على النص الكامل
احصل على النص الكامل
article -
91
On Indefinite Quadratic Optimization over the Intersection of Balls and Linear Constraints
منشور في 2022"…To solve e-TRS, we use the alternating direction method of multipliers approach and a branch and bound algorithm. Numerical experiments show the efficiency of the proposed approach compared to the CVX and the extended adaptive ellipsoid-based algorithm.…"
-
92
Parallel tabu search in a heterogeneous environment
منشور في 2003"…We discuss a parallel tabu search algorithm with implementation in a heterogeneous environment. …"
احصل على النص الكامل
احصل على النص الكامل
article -
93
Performance driven standard-cell placement using the geneticalgorithm
منشور في 1995"…The paths are enumerated using a new approach based on the notion of -criticality. Experiments with test circuits demonstrate delay performance improvement by up to 20%…"
احصل على النص الكامل
احصل على النص الكامل
article -
94
Nested ensemble selection: An effective hybrid feature selection method
منشور في 2023"…It has been shown that while feature selection algorithms are able to distinguish between relevant and irrelevant features, they fail to differentiate between relevant and redundant and correlated features. …"
احصل على النص الكامل
article -
95
Reinforcement R-learning model for time scheduling of on-demand fog placement
منشور في 2020"…We also demonstrate the ability of our model to improve over time by adapting the new demand of users. Experiments comparing the decisions of our model with two other potential fog placement approaches used for task/service scheduling (threshold based and random based) show that the number of processed requests performed by the cloud decreases from 100 to 30% with a limited number of fogs to push. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
96
StackDPPred: Multiclass prediction of defensin peptides using stacked ensemble learning with optimized features
منشور في 2024"…The peptide sequences are encoded using split amino acid composition (SAAC), segmented position specific scoring matrix (SegPSSM), histogram of oriented gradients-based PSSM (HOGPSSM) and feature extraction based graphical and statistical (FEGS) descriptors. …"
-
97
-
98
Dynamic adaptation for video streaming over mobile devices. (c2013)
منشور في 2013احصل على النص الكامل
احصل على النص الكامل
masterThesis -
99
A hybrid approach for XML similarity
منشور في 2007"…In this paper, we integrate IR semantic similarity assessment in an edit distance algorithm, seeking to amend similarity judgments when comparing XML-based documents. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
100
Performance comparison of variable-stepsize IMEX SBDF methods on advection-diffusion-reaction models
منشور في 2025"…We develop an adaptive time-stepping and error control algorithm for VSSBDF methods up to fourth order based on a step-doubling refinement technique using estimates of the local truncation errors. …"