Search alternatives:
generation algorithm » genetic algorithm (Expand Search)
change detection » drone detection (Expand Search)
Showing 1 - 20 results of 73 for search '(( code ((generation algorithm) OR (selection algorithm)) ) OR ( change detection algorithm ))', query time: 0.13s Refine Results
  1. 1

    UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data by Behrouz Ahadzadeh (19757022)

    Published 2024
    “…To overcome these challenges, a new FS algorithm named Uniform-solution-driven Binary Feature Selection (UniBFS) has been developed in this study. …”
  2. 2

    Detection of statistically significant network changes in complex biological networks by Raghvendra Mall (581171)

    Published 2017
    “…It can happen that due to gene mutations, as for example when cancer progresses, the gene expression network undergoes some amount of localized re-wiring. The ability to detect statistical relevant changes in the interaction patterns induced by the progression of the disease can lead to the discovery of novel relevant signatures. …”
  3. 3

    Minimum traffic inter-BS SHO boundary selection algorithm for CDMA-based wireless networks by Abu-Amara, M.

    Published 2004
    “…An algorithm is presented to select an inter-base station soft handoff (inter-BS SHO) boundary for code division multiple access (CDMA)-based wireless networks. …”
    Get full text
    Get full text
    article
  4. 4
  5. 5

    Land Use/Land Cover Changes Impact on Groundwater Level and Quality in the Northern Part of the United Arab Emirates by Elmahdy, Samy

    Published 2020
    “…Each pair of enhanced LULC maps (1990–2000, 2000–2010, 2010–2018, and 1990–2018) were used as input data for an image difference algorithm to monitor LULC changes. Maps of change detection were then imported into a GIS environment and spatially correlated against the spatiotemporal maps of groundwater level and groundwater quality. …”
    Get full text
    article
  6. 6
  7. 7

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…The research work carried out, in relation to attack detection ensemble learning, mainly aims to increase the performance of machine learning algorithms by combining their results. …”
    Get full text
  8. 8

    LNCRI: Long Non-Coding RNA Identifier in Multiple Species by Saleh Musleh (15279190)

    Published 2021
    “…<p>The pervasive nature of long non-coding RNA (lncRNA) transcription in the mammalian genomes has changed our protein-centric view of genomes. …”
  9. 9

    CNN and HEVC Video Coding Features for Static Video Summarization by Issa, Obada

    Published 2022
    “…During coding, 64 proposed features were generated from the coder for each frame. …”
    Get full text
    article
  10. 10

    Generating haptic texture using solid noise by Osama Halabi (14158905)

    Published 2021
    “…In computer haptics, texture can render environments more realistic and provide useful information. In this paper, an algorithm is proposed for virtual texture simulation by using solid noise, where only a few parameters need to be altered to generate a range of realistic and diverse textures by reproducing different frequencies similar to that of real vibrational signals in a virtual environment. …”
  11. 11

    Large language models for code completion: A systematic literature review by Rasha Ahmad Husein (19744756)

    Published 2024
    “…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …”
  12. 12
  13. 13
  14. 14

    Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis by Hassan, Ali

    Published 2023
    “…Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …”
    Get full text
    Get full text
    Get full text
    article
  15. 15

    Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis by Hassan Ali (3348749)

    Published 2023
    “…<p>Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …”
  16. 16

    Practical single node failure recovery using fractional repetition codes in data centers by Itani, May

    Published 2016
    “…Node failures in distributed storage systems are becoming a critical issue, and many erasure codes are designed to handle such failures. The purpose of this paper is to evaluate fractional repetition (FR) codes, a class of regenerating codes for distributed storage systems, as a practical solution. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  17. 17
  18. 18

    A new genetic algorithm approach for unit commitment by Mantawy, A.H.

    Published 1997
    “…In the proposed algorithm, coding the solution of the unit commitment problem is based on mixing binary and decimal representations. …”
    Get full text
    Get full text
    article
  19. 19

    Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators by Abu Zitar, Raed

    Published 2021
    “…DNA microarray technology is the fabrication of a single chip to contain a thousand genetic codes. Each microarray experiment can analyze many thousands of genes in parallel. …”
    Get full text
  20. 20