Search alternatives:
encoding algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
making algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
Showing 181 - 200 results of 216 for search '(( element method algorithm ) OR ((( data encoding algorithm ) OR ( based making algorithm ))))*', query time: 0.13s Refine Results
  1. 181

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. In this paper, we proposed a novel technique in steganography within the digital images such is RGB, Gray Scale, Texture, Aerial images to achieve higher security, imperceptibility, capacity, and robustness as compared with existing methods. …”
  2. 182

    Fine-grain watermarking for intellectual property protection by Stefano Giovanni Rizzo (18615112)

    Published 2019
    “…In particular, the embedding and extraction algorithms allow to continuously protect the watermark through the whole document in a fine-grain fashion. …”
  3. 183

    Resilience analytics: coverage and robustness in multi-modal transportation networks by Abdelkader Baggag (14153040)

    Published 2018
    “…A future goal is to use this experience to make projections for a fast growing city like Doha.…”
  4. 184

    Adaptive PPO With Multi-Armed Bandit Clipping and Meta-Control for Robust Power Grid Operation Under Adversarial Attacks by Mohamed Massaoudi (16888710)

    Published 2025
    “…This paper proposes a novel composite enhanced proximal policy optimization (CePPO) algorithm to improve power grid operation under adversarial conditions. …”
  5. 185
  6. 186

    PAST-AI: Physical-Layer Authentication of Satellite Transmitters via Deep Learning by Gabriele Oligeri (14151426)

    Published 2022
    “…<p dir="ltr">Physical-layer security is regaining traction in the research community, due to the performance boost introduced by deep learning classification algorithms. This is particularly true for sender authentication in wireless communications via radio fingerprinting. …”
  7. 187

    Deep and transfer learning for building occupancy detection: A review and comparative analysis by Aya Nabil Sayed (17317006)

    Published 2022
    “…Moreover, the paper conducted a comparative study of the readily available algorithms for occupancy detection to determine the optimal method in regards to training time and testing accuracy. …”
  8. 188

    Prediction the performance of multistage moving bed biological process using artificial neural network (ANN) by Fares Almomani (12585685)

    Published 2020
    “…<p dir="ltr">Complexity, uncertainty, and high dynamic nature of nutrient removal through biological processes (BPs) makes it difficult to model and control these processes, forcing designers to rely on approximations, probabilities, and assumptions. …”
  9. 189

    Learning Spatiotemporal Latent Factors of Traffic via Regularized Tensor Factorization: Imputing Missing Values and Forecasting by Abdelkader Baggag (16864140)

    Published 2019
    “…The learned factors, with a graph-based temporal dependency, are then used in an autoregressive algorithm to predict the future state of the road network with a large horizon. …”
  10. 190

    An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation by El-Maleh, Aiman H.

    Published 2001
    “…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …”
    Get full text
    article
  11. 191

    An evolutionary meta-heuristic for state justification insequential automatic test pattern generation by El-Maleh, A.H.

    Published 2001
    “…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …”
    Get full text
    Get full text
    article
  12. 192

    DASSI: differential architecture search for splice identification from DNA sequences by Shabir Moosa (14153316)

    Published 2022
    “…The benchmarking experiments of execution time and precision on architecture search and evaluation process showed better performance on recently available GPUs making it feasible to adopt architecture search based methods on large datasets.…”
  13. 193

    Approximate XML structure validation based on document–grammar tree similarity by Tekli, Joe

    Published 2015
    “…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  14. 194

    Approximate XML structure validation technical report by Tekli, Joe

    Published 2014
    “…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…”
    Get full text
    Get full text
    Get full text
    article
  15. 195

    An App for Navigating Patient Transportation and Acute Stroke Care in Northwestern Ontario Using Machine Learning: Retrospective Study by Ayman Hassan (14426412)

    Published 2024
    “…We aimed to develop an app using a comprehensive geomapping navigation and estimation system based on machine learning algorithms. This app uses key stroke-related timelines including the last time the patient was known to be well, patient location, treatment options, and imaging availability at different health care facilities.…”
  16. 196

    The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions by Abdulmalik Alwarafy (17984104)

    Published 2022
    “…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
  17. 197
  18. 198

    Efficient XML Structural Similarity Detection using Sub-tree Commonalities by Tekli, Joe

    Published 2007
    “…Various algorithms for comparing hierarchically structured data, e.g. …”
    Get full text
    Get full text
    conferenceObject
  19. 199

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare by Haraty, Ramzi A.

    Published 2007
    “…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  20. 200

    A data envelopment analysis model for opinion leaders’ identification in social networks by Hamed Baziyad (19273738)

    Published 2024
    “…Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. …”