بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
ipca algorithm » jaya algorithm (توسيع البحث)
element » elements (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
ipca algorithm » jaya algorithm (توسيع البحث)
element » elements (توسيع البحث)
-
61
Evaluation of C-arm CT metal artifact reduction algorithm during intra-aneurysmal coil embolization
منشور في 2016"…This analysis was carried out to assess the improvements in both brain parenchyma and device visibility with MAR algorithm. Further, ground truth reference images from phantom experiments and clinical data were used for accurate assessment. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
62
Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation
منشور في 2022"…We describe our differentially-private model with flexible constraints and a dynamic window algorithm to maintain the privacy-budget loss in infinitely generated time-series data. …"
-
63
Modified Elite Opposition-Based Artificial Hummingbird Algorithm for Designing FOPID Controlled Cruise Control System
منشور في 2023"…This study proposes a novel approach for designing a fractional order proportional-integral-derivative (FOPID) controller that utilizes a modified elite opposition-based artificial hummingbird algorithm (m-AHA) for optimal parameter tuning. …"
احصل على النص الكامل
-
64
A method for data path synthesis using neural networks
منشور في 2017احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
65
Indexing Arabic texts using association rule data mining
منشور في 2019"…The model denotes extracting new relevant words by relating those chosen by previous classical methods to new words using data mining rules. Design/methodology/approach The proposed model uses an association rule algorithm for extracting frequent sets containing related items – to extract relationships between words in the texts to be indexed with words from texts that belong to the same category. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
66
Using genetic algorithms to optimize software quality estimation models
منشور في 2004"…In the first approach, we assume the existence of several models, and we use a genetic algorithm to combine them, and adapt them to a given data set. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
67
-
68
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
منشور في 2022"…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …"
-
69
Correlation Clustering via s-Club Cluster Edge Deletion
منشور في 2023"…We run these algorithms and cross-compare the three experiment results to the fastest Cluster Editing algorithm which runs in O(1.62k) time. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
70
An efficient approach for textual data classification using deep learning
منشور في 2022"…<p dir="ltr">Text categorization is an effective activity that can be accomplished using a variety of classification algorithms. In machine learning, the classifier is built by learning the features of categories from a set of preset training data. …"
-
71
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
منشور في 2022"…The method used in this research is a classification of models and algorithms used in data mining. …"
احصل على النص الكامل
-
72
-
73
Data Embedding in HEVC Video by Modifying the Partitioning of Coding Units
منشور في 2019"…The flags pertaining to 16x16 sub CUs are used as a cover for data embedding, where 6 or 4 message bits are embedded per CU. …"
احصل على النص الكامل
article -
74
-
75
XBeGene: Scalable XML Documents Generator by Example Based on Real Data
منشور في 2012"…XML datasets of various sizes and properties are needed to evaluate the correctness and efficiency of XML-based algorithms and applications. While several downloadable datasets can be found online, these are predefined by system experts and might not be suitable to evaluate every algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
76
Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las...
منشور في 2020"…A library of possible mother wavelets was designed based on the experimental data. As the inci dent wave for each sensing point varies because of the physical condition of the rail surface and the laser excitation, the algorithm automatically picks the mother wavelet from the library that generates the lar gest absolute cross-correlation with the incident wave. …"
احصل على النص الكامل
-
77
Auto-indexing Arabic texts based on association rule data mining. (c2015)
منشور في 2015"…Our model denotes extracting new relevant words by relating those chosen by the previous classical methods, to new words using data mining rules. The model uses the Apriori Algorithm - an association rule algorithm for extracting frequent sets containing related items - to extract relations between words in the texts to be indexed with words from texts that belong to the same category. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
78
Unsupervised Deep Learning for Classification Of Bats Calls Using Acoustic Data
منشور في 2021احصل على النص الكامل
doctoralThesis -
79
Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing
منشور في 2023"…This paper provides a comparative analysis of various metaheuristic load balancing algorithms for cloud computing based on performance factors i.e., Makespan time, degree of imbalance, response time, data center processing time, flow time, and resource utilization. …"
-
80
Customs Trade Facilitation and Compliance for Ecommerce using Blockchain and Data Mining
منشور في 2021"…Additionally, the Cross Industry Standard Process for Data Mining (CRISP-DM) methodology is employed for modelling the two proposed clustering algorithms to identify transactional risks. …"
احصل على النص الكامل