بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
element processing » melt processing (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
element processing » melt processing (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
-
141
-
142
Single channel speech denoising by DDPG reinforcement learning agent
منشور في 2025"…In this paper, a novel SD algorithm is presented based on the deep deterministic policy gradient (DDPG) agent; an off-policy reinforcement learning (RL) agent with a continuous action space. …"
-
143
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
منشور في 2020"…However, high dimensional data present a significant challenge for machine learning techniques. …"
-
144
Correlation Clustering with Overlaps
منشور في 2020"…We present a heuristic algorithm and a semi-exact algorithm for the Multi-Parameterized Cluster Editing with Vertex Splitting problem. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
145
-
146
A hybrid cryptosystem based on WEP for 802.11 networks. (c2006)
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
masterThesis -
147
Nested ensemble selection: An effective hybrid feature selection method
منشور في 2023"…It has been shown that while feature selection algorithms are able to distinguish between relevant and irrelevant features, they fail to differentiate between relevant and redundant and correlated features. …"
احصل على النص الكامل
article -
148
Digital twin in energy industry: Proposed robust digital twin for power plant and other complex capital-intensive large engineering systems
منشور في 2022"…Data-driven algorithms with capabilities to predict the system’s dynamic behavior still need to be developed. …"
-
149
Information warfare. (c2015)
منشور في 2015"…Numerous damage assessment and recovery algorithms have been proposed by researchers. In this work we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
150
-
151
-
152
-
153
R-CONV++: uncovering privacy vulnerabilities through analytical gradient inversion attacks
منشور في 2025"…The first algorithm presents a novel data leakage method that efficiently exploits convolutional layer gradients, demonstrating that even with non-fully invertible activation functions, such as ReLU, training samples can be analytically reconstructed directly from gradients without the need to reconstruct intermediate layer outputs. …"
-
154
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
منشور في 2024"…<p dir="ltr">The Internet of Things (IoT) is extensively used in modern-day life, such as in smart homes, intelligent transportation, etc. However, the present security measures cannot fully protect the IoT due to its vulnerability to malicious assaults. …"
-
155
-
156
An Alternating Projection Framework for Elementwise Masked Nonlinear Matrix Decomposition
منشور في 2025احصل على النص الكامل
doctoralThesis -
157
-
158
HVAC system attack detection dataset
منشور في 2021"…It aims to promote and support the research in the field of cybersecurity of HVAC systems in smart buildings by facilitating the validation of attack detection and mitigation strategies, benchmarking the performance of different data-driven algorithms, and studying the impact of attacks on the HVAC system.…"
-
159
Intelligent Bilateral Client Selection in Federated Learning Using Game Theory
منشور في 2022"…Adopting a random selection strategy would entail substantial problems due to the heterogeneity in terms of data quality, and computational and communication resources across the participants. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
160
Android Malware Detection Using Machine Learning
منشور في 2024"…This paper presents a machine learning approach for Android malware detection. …"
احصل على النص الكامل
article