بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
mining algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
element » elements (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
mining algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
element » elements (توسيع البحث)
-
481
-
482
Deepfakes Signatures Detection in the Handcrafted Features Space
منشور في 2023"…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …"
احصل على النص الكامل
-
483
An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation
منشور في 2001"…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
احصل على النص الكامل
article -
484
An evolutionary meta-heuristic for state justification insequential automatic test pattern generation
منشور في 2001"…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
احصل على النص الكامل
احصل على النص الكامل
article -
485
Combinatorial method for bandwidth selection in wind speed kernel density estimation
منشور في 2019"…This goal calls for devising probabilistic models with adaptive algorithms that accurately fit wind speed distributions. …"
احصل على النص الكامل
-
486
Role of authentication factors in Fin-tech mobile transaction security
منشور في 2023"…<p dir="ltr">Fin-Tech is the merging of finance and technology, to be considered a key term for technology-based financial operations and money transactions as far as Fin-Tech is concerned. …"
-
487
Sentiment Analysis for Arabic Social media Movie Reviews Using Deep Learning
منشور في 2022"…Prior to performing sentiment analysis, it is necessary to prepare the data so that it may be used to train machine learning (ML) algorithms. …"
احصل على النص الكامل
-
488
A fine-grained XML structural comparison approach
منشور في 2007"…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
489
Predicting the Heats of Fusion of Ionic Liquids via Group Contribution Modeling and Machine Learning
منشور في 2022احصل على النص الكامل
doctoralThesis -
490
Towards Multimedia Fragmentation
منشور في 2006"…Database fragmentation is a process for reducing irrelevant data accesses by grouping data frequently accessed together in dedicated segments. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
491
Automated systems for diagnosis of dysgraphia in children: a survey and novel framework
منشور في 2024"…This work discusses the data collection method, important handwriting features, and machine learning algorithms employed in the literature for the diagnosis of dysgraphia. …"
-
492
A Survey of Deep Learning Approaches for the Monitoring and Classification of Seagrass
منشور في 2025"…The collection of digital images for monitoring underwater habitats, such as seagrass meadows, has increased significantly as recent progress in imaging technology has made it easier to collect high-resolution data. The increase in imagery data has in turn created a demand for automated detection and classification using deep neural network-based techniques. …"
-
493
Efficient XML Structural Similarity Detection using Sub-tree Commonalities
منشور في 2007"…Various algorithms for comparing hierarchically structured data, e.g. …"
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
494
Automatic White Blood Cell Differential Classification
منشور في 2005احصل على النص الكامل
doctoralThesis -
495
-
496
An efficient cache replacement strategy for the hybrid cache consistency approach
منشور في 2010"…Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. In this thesis, we proposed a new cache replacement strategy, the Least Unified Value strategy (LUV) to replace the Least Recently Used (LRU) that SACCS was based on. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
497
Privacy-preserving energy optimization via multi-stage federated learning for micro-moment recommendations
منشور في 2025"…To address this challenge, this study aims to optimize household energy consumption while preserving data privacy by proposing an innovative two-stage Federated Learning (FL) framework that delivers real-time micro-moment-based recommendations. …"
-
498
CNN feature and classifier fusion on novel transformed image dataset for dysgraphia diagnosis in children
منشور في 2023"…Three machine learning algorithms support vector machine (SVM), AdaBoost, and Random forest are employed to assess the performance of the CNN features and fused CNN features. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
499
From Collatz Conjecture to chaos and hash function
منشور في 2023"…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
-
500
Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images
منشور في 2023"…The class imbalance issue was handled through multiple data augmentation methods to overcome the biases. …"