يعرض 101 - 120 نتائج من 201 نتيجة بحث عن '(((( experiments based algorithm ) OR ( relevant data algorithm ))) OR ( neural coding algorithm ))', وقت الاستعلام: 0.10s تنقيح النتائج
  1. 101
  2. 102

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts حسب ALSHAMSI, SUROUR

    منشور في 2022
    "…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …"
    احصل على النص الكامل
  3. 103
  4. 104

    Improving MRI Resolution: A Cycle Consistent Generative Adversarial Network-Based Approach for 3T to 7T Translation حسب Zakaria Shams Siam (22048001)

    منشور في 2024
    "…Various CycleGAN architectures were experimented with and compared on this dataset. The best performing CycleGAN architecture successfully produced the reconstructed images with a high level of accuracy based on different quantitative and qualitative evaluation criteria. …"
  5. 105

    A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study حسب Masurkar, Faeez

    منشور في 2022
    "…Finally, a 3D Finite Element simulation was conducted to validate the findings and each observation resulting from the experiments. Based on the obtained accuracy of the results, the proposed methodology has been found to be capable of inspecting rail track specimens in a completely non-contact manner with reasonably good accuracy…"
    احصل على النص الكامل
  6. 106

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment حسب Zakaria Tolba (16904718)

    منشور في 2022
    "…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …"
  7. 107

    Frontiers and trends of supply chain optimization in the age of industry 4.0: an operations research perspective حسب Zhitao Xu (2426023)

    منشور في 2024
    "…It contributes to the literature by identifying the four OR innovations to typify the recent advances in SC optimization: new modeling conditions, new inputs, new decisions, and new algorithms. Furthermore, we recommend four promising research avenues in this interplay: (1) incorporating new decisions relevant to data-enabled SC decisions, (2) developing data-enabled modeling approaches, (3) preprocessing parameters, and (4) developing data-enabled algorithms. …"
  8. 108
  9. 109

    Impact Of Multidisciplinary Maternal Resuscitation Training Program on Improving the Front-Line Care Provider’s Readiness to Manage Maternal Cardiac Arrest: A Pre-test/Post-test St... حسب Mohamed Elsayed Saad Aboudonya (18466385)

    منشور في 2024
    "…The multidisciplinary resuscitation teams were observed during the cardiac arrest mock drills both before and after conducting the multidisciplinary resuscitation simulation-based training program and the introduction of the maternal resuscitation algorithm pathway against seven KPIs. …"
  10. 110

    Vehicular-OBUs-As-On-Demand-Fogs حسب Sami, Hani

    منشور في 2020
    "…Experiments and simulations demonstrate the relevance and efficiency of our approach compared to other recent techniques in the literature.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 111

    Full-fledged semantic indexing and querying model designed for seamless integration in legacy RDBMS حسب Tekli, Joe

    منشور في 2018
    "…To do so, we design and construct a semantic-aware inverted index structure called SemIndex, extending the standard inverted index by constructing a tightly coupled inverted index graph that combines two main resources: a semantic network and a standard inverted index on a collection of textual data. We then provide a general keyword query model with specially tailored query processing algorithms built on top of SemIndex, in order to produce semantic-aware results, allowing the user to choose the results' semantic coverage and expressiveness based on her needs. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 112

    Recent Advances in Harris Hawks Optimization: A Comparative Study and Applications حسب Hussie, Abdelazim

    منشور في 2022
    "…In this review research, we focused on the applications and developments of the recent well-established robust optimizer Harris hawk optimizer (HHO) as one of the most popular swarm-based techniques of 2020. Moreover, several experiments were carried out to prove the powerfulness and effectivness of HHO compared with nine other state-of-art algorithms using Congress on Evolutionary Computation (CEC2005) and CEC2017. …"
    احصل على النص الكامل
  13. 113

    LOCATING DAMAGES IN THIN ALUMINIUM PLATES USING LAMB WAVES AND AGENETIC OPTIMIZATION APPROACH حسب A. Masurkar, Faeez

    منشور في 2021
    "…A new damage localization method based on Lamb waves is presented here for thin aluminium (Al) plate specimens using a Genetic optimization (GO) approach. …"
    احصل على النص الكامل
  14. 114
  15. 115
  16. 116

    Turbo-charging dominating set with an FPT subroutine حسب Abu-Khzam, Faisal N.

    منشور في 2017
    "…Turbo-charging is a recent algorithmic technique that is based on the fixed-parameter tractability of the dynamic versions of some problems as a way to improve heuristics. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  17. 117

    Inception voltage of corona in bipolar ionized fields-effect oncorona power loss حسب Al-Hamouz, Z.

    منشور في 1996
    "…In this paper, an iterative finite element based algorithm is presented as a numerical tool for the solution of the bipolar ionized field around high voltage direct current (HVDC) transmission lines. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 118

    On Indefinite Quadratic Optimization over the Intersection of Balls and Linear Constraints حسب Temadher A. Almaadeed (14151288)

    منشور في 2022
    "…To solve e-TRS, we use the alternating direction method of multipliers approach and a branch and bound algorithm. Numerical experiments show the efficiency of the proposed approach compared to the CVX and the extended adaptive ellipsoid-based algorithm.…"
  19. 119

    Parallel tabu search in a heterogeneous environment حسب Al-Yamani, A.

    منشور في 2003
    "…We discuss a parallel tabu search algorithm with implementation in a heterogeneous environment. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 120

    Performance driven standard-cell placement using the geneticalgorithm حسب Youssef, H.

    منشور في 1995
    "…The paths are enumerated using a new approach based on the notion of -criticality. Experiments with test circuits demonstrate delay performance improvement by up to 20%…"
    احصل على النص الكامل
    احصل على النص الكامل
    article