Showing 61 - 80 results of 155 for search '(((( experimental data algorithm ) OR ( elements uce algorithm ))) OR ( level coding algorithm ))*', query time: 0.11s Refine Results
  1. 61

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method by Amit Kumar Balyan (18288964)

    Published 2022
    “…Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …”
  2. 62

    Performance of artificial intelligence models in estimating blood glucose level among diabetic patients using non-invasive wearable device data by Arfan Ahmed (17541309)

    Published 2023
    “…Our experimental design included Data Collection, Feature Engineering, ML model selection/development, and reporting evaluation of metrics.…”
  3. 63

    A Fuzzy Low-Dimensional Intersection Graph Representation Approach for Graph Compression and Anonymization by Yamout, Youssef

    Published 2021
    “…We examine several heuristic algorithms in an attempt to achieve these two main objectives and conduct a thorough experimental analysis providing evidence of the effectiveness of our graph mapping approach. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  4. 64

    Degree-Based Network Anonymization by Halawi, Ola

    Published 2020
    “…A corresponding graph realization approach is introduced based on a reduction to the Weighted Edge Cover problem, which in turn is solved using Integer Linear Programming to obtain the best possible solution. Our thorough experimental studies provide empirical evidence of the effectiveness of the new approach; by specifically showing that the introduced anonymization algorithm has a negligible effect on the way nodes are clustered, thereby preserving valuable network information while significantly improving the data privacy.…”
    Get full text
    Get full text
    Get full text
    masterThesis
  5. 65
  6. 66

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …”
  7. 67
  8. 68

    Simple and effective neural-free soft-cluster embeddings for item cold-start recommendations by Shameem A. Puthiya Parambath (14150997)

    Published 2022
    “…Though many item embedding approaches have been proposed for item cold-start recommendations in the past—and simple as they might appear—to the best of our knowledge, the approach based on soft-cluster embeddings has not been proposed in the research literature. Our experimental results on four benchmark datasets conclusively demonstrate that the proposed algorithm makes accurate recommendations in item cold-start settings compared to the state-of-the-art algorithms according to commonly used ranking metrics like Normalized Discounted Cumulative Gain (NDCG) and Mean Average Precision (MAP). …”
  9. 69
  10. 70
  11. 71

    Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las... by Masurkar, Faeez

    Published 2020
    “…A library of possible mother wavelets was designed based on the experimental data. As the inci dent wave for each sensing point varies because of the physical condition of the rail surface and the laser excitation, the algorithm automatically picks the mother wavelet from the library that generates the lar gest absolute cross-correlation with the incident wave. …”
    Get full text
  12. 72

    Correlation Clustering with Overlaps by Fakhereldine, Amin

    Published 2020
    “…In our experimental analysis, we study the efficiency of our algorithms as well as the effectiveness of allowing vertex splitting. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  13. 73

    Boosting the visibility of services in microservice architecture by Ahmet Vedat Tokmak (17773479)

    Published 2023
    “…In this research, we evaluate the performance of several classification algorithms for estimating the quality of microservices using the QWS dataset containing traffic data of 2505 microservices. …”
  14. 74
  15. 75
  16. 76

    Enhanced PSO-Based NN for Failures Detection in Uncertain Wind Energy Systems by Khaled Dhibi (16891524)

    Published 2023
    “…First, a feature selection tool using PSO Algorithm is developed. Then, in order to maximize the diversity between data samples and improve the effectiveness of using PSO algorithm for feature selection, the Euclidean distance metric is used in order to reduce the data and maximize the diversity between data samples. …”
  17. 77

    MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks by Artail, Hassan

    Published 2009
    “…The goal of the proposed algorithm is to minimize the average number of hops taken to reach the node that holds the desired data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  18. 78

    Graph contraction for physical optimization methods by Mansour, Nashat

    Published 1993
    “…The experimental results show that the PGC algorithm still leads to a reasonably good quality mapping solutions to the original problem, while producing a substantial reduction in mapping time. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  19. 79

    A static test compaction technique for combinational circuits based on independent fault clustering by Osais, Y.E.

    Published 2003
    “…It is based on a new concept called test vector decomposition. Experimental results for benchmark circuits demonstrate the effectiveness of the new static compaction algorithm.…”
    Get full text
    Get full text
    article
  20. 80