Search alternatives:
using algorithm » cosine algorithm (Expand Search)
two algorithms » _ algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
two algorithms » _ algorithms (Expand Search)
-
61
Clustering/partitioning algorithms and comparative analysis
Published 1989Get full text
Get full text
masterThesis -
62
-
63
-
64
-
65
A multi-class discriminative motif finding algorithm for autosomal genomic data. (c2015)
Published 2016“…New technologies, such as Next-Generation Genome Sequencing, can now provide huge amounts of data in little time. Big initiatives such as the International Hapmap Project and the 1000 Genome project are making use of these technologies to provide the scientific community with a detailed genetic reference from different populations. …”
Get full text
Get full text
masterThesis -
66
-
67
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
Published 2022“…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
-
68
Capturing outline of fonts using genetic algorithm and splines
Published 2001“…Some examples are given to show the results obtained from the algorithm…”
Get full text
Get full text
article -
69
Prediction of pressure gradient for oil-water flow: A comprehensive analysis on the performance of machine learning algorithms
Published 2022“…A total of eleven hundred experimental data points for nine FPs (two stratified and seven dispersed patterns) in horizontal wellbores are used to develop the MLs. …”
-
70
-
71
Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation
Published 2022“…We describe our differentially-private model with flexible constraints and a dynamic window algorithm to maintain the privacy-budget loss in infinitely generated time-series data. …”
-
72
PILE-UP FREE PARAMETER ESTIMATION AND DIGITAL ONLINE PEAK LOCALIZATION ALGORITHMS FOR GAMMA RAY SPECTROSCOPY
Published 2020“…This study uses the above facility in developing algorithms for digitally determining the basic pulse parameters and tackling the problem of pulse pile-up in Gamma-ray spectroscopy. …”
Get full text
article -
73
Genetic-Algorithm-Based Neural Network for Fault Detection and Diagnosis: Application to Grid-Connected Photovoltaic Systems
Published 2022“…The classification performance is determined via different metrics for various GA-based ANN classifiers using data extracted from the healthy and faulty data of the GCPV system. …”
-
74
A method for data path synthesis using neural networks
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
75
Indexing Arabic texts using association rule data mining
Published 2019“…The model denotes extracting new relevant words by relating those chosen by previous classical methods to new words using data mining rules. Design/methodology/approach The proposed model uses an association rule algorithm for extracting frequent sets containing related items – to extract relationships between words in the texts to be indexed with words from texts that belong to the same category. …”
Get full text
Get full text
Get full text
Get full text
article -
76
An efficient approach for textual data classification using deep learning
Published 2022“…<p dir="ltr">Text categorization is an effective activity that can be accomplished using a variety of classification algorithms. In machine learning, the classifier is built by learning the features of categories from a set of preset training data. …”
-
77
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…The method used in this research is a classification of models and algorithms used in data mining. …”
Get full text
-
78
IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture
Published 2025“…The IoMT manufacturers need to offer their products at a competitive price, which forces them to use simplified architecture, leaving limited and, to some extent, no scope to employ sophisticated cybersecurity algorithms. …”
-
79
A Graph Heuristic Approach for the Data Path Allocation Problem
Published 2022Get full text
Get full text
Get full text
masterThesis -
80
Data Embedding in HEVC Video by Modifying the Partitioning of Coding Units
Published 2019“…The flags pertaining to 16x16 sub CUs are used as a cover for data embedding, where 6 or 4 message bits are embedded per CU. …”
Get full text
article