Showing 1 - 20 results of 31 for search '(( alignment aya algorithm ) OR ((( data encoding algorithm ) OR ( data injection algorithm ))))', query time: 0.11s Refine Results
  1. 1

    Efficient Approximate Conformance Checking Using Trie Data Structures by Awad, Ahmed

    Published 2021
    Subjects: “…Estimation error,Runtime,Computational modeling,Data structures,Approximation algorithms,Encoding,Computational efficiency…”
    Get full text
    Get full text
    Get full text
  2. 2
  3. 3

    The unified effect of data encoding, ansatz expressibility and entanglement on the trainability of HQNNs by Muhammad Kashif (3923483)

    Published 2023
    “…We focus on the combined influence of data encoding, qubit entanglement, and ansatz expressibility in hybrid quantum neural networks (HQNNs) for multi-class classification tasks. …”
  4. 4
  5. 5

    Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security by Muhammad Maaz (5600600)

    Published 2024
    “…The aim is to demonstrate the robustness of the proposed algorithms in effectively identifying telnet, password, distributed denial of service (DDoS), injection, and backdoor vulnerabilities in IoT ecosystems. …”
  6. 6

    A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks by Umesh Kumar Lilhore (17727684)

    Published 2022
    “…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …”
  7. 7

    Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm by Saima Hassan (14918003)

    Published 2022
    “…The antecedent part parameters (Gaussian membership function parameters) are encoded as a population of artificial swarm of grasshoppers and optimized using its algorithm. …”
  8. 8

    K Nearest Neighbor OveRsampling approach: An open source python package for data augmentation by Ashhadul Islam (16869981)

    Published 2022
    “…This paper introduces K Nearest Neighbor OveRsampling (KNNOR) Algorithm — a novel data augmentation technique that considers the distribution of data and takes into account the k nearest neighbors while generating artificial data points. …”
  9. 9
  10. 10

    Wide area monitoring system operations in modern power grids: A median regression function-based state estimation approach towards cyber attacks by Haris M. Khalid (17017743)

    Published 2023
    “…However, the traffic of digital information and communication is potentially vulnerable to data-injection and cyber attacks. To address this issue, a median regression function (MRF)-based state estimation is presented in this paper. …”
  11. 11

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches by Natasha Akram (20749538)

    Published 2024
    “…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …”
  12. 12
  13. 13
  14. 14

    Competitive learning/reflected residual vector quantization for coding angiogram images by Mourn, W.A.H.

    Published 2003
    “…Medical images need to be compressed for the purpose of storage/transmission of a large volume of medical data. Reflected residual vector quantization (RRVQ) has emerged recently as one of the computationally cheap compression algorithms. …”
    Get full text
    Get full text
    article
  15. 15

    Design and analysis of entropy-constrained reflected residual vector quantization by Mousa, W.A.H.

    Published 2002
    “…Residual vector quantization (RVQ) is a vector quantization (VQ) paradigm which imposes structural constraints on the encoder in order to reduce the encoding search burden and memory storage requirements of an unconstrained VQ. …”
    Get full text
    Get full text
    article
  16. 16

    Modelling of pollutant transport in compound open channels by Chatila, Jean Georges

    Published 1998
    “…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …”
    Get full text
    Get full text
    masterThesis
  17. 17

    Efficient Seismic Volume Compression using the Lifting Scheme by Khene, M. F.

    Published 2000
    “…In addition, the lifting scheme offers: 1) a dramatic reduction of the required auxiliary memory, 2) an efficient combination with parallel rendering algorithms to perform arbitrary surface and volume rendering for interactive visualization, and 3) an easy integration in the parallel I/O seismic data loading routines. …”
    Get full text
    article
  18. 18

    Future Prediction of COVID-19 Vaccine Trends Using a Voting Classifier by Syed Ali Jafar Zaidi (19563178)

    Published 2021
    “…Modern ML models are used for prediction, prioritization, and decision making. Multiple ML algorithms are used to improve decision-making at different aspects after forecasting. …”
  19. 19
  20. 20

    A Geometric-Primitives-Based Compression Scheme for Testing Systems-on-a-Chip by El-Maleh, Aiman H.

    Published 2001
    “…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data.…”
    Get full text
    article