Search alternatives:
groups algorithm » mould algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
mold algorithm » mould algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
element » elements (Expand Search)
groups algorithm » mould algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
mold algorithm » mould algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
element » elements (Expand Search)
-
1
-
2
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
Published 2023“…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …”
-
3
-
4
Hardening the ElGamal cryptosystem in the setting of the second group of units. (c2011)
Published 2011Get full text
Get full text
masterThesis -
5
Variable Selection in Data Analysis: A Synthetic Data Toolkit
Published 2024“…Variable (feature) selection plays an important role in data analysis and mathematical modeling. This paper aims to address the significant lack of formal evaluation benchmarks for feature selection algorithms (FSAs). …”
Get full text
article -
6
CNN and HEVC Video Coding Features for Static Video Summarization
Published 2022Get full text
article -
7
-
8
-
9
Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm
Published 2022“…Researchers have scrutinized data hiding schemes in recent years. Data hiding in standard images works well, but does not provide satisfactory results in distortion-sensitive medical, military, or forensic images. …”
Get full text
-
10
A Survey of Data Clustering Techniques
Published 2023“…Clustering, an unsupervised learning technique, aims to identify a specific number of clusters to effectively categorize the data through data grouping. Hence, clustering is related to many fields and is used in various applications that deal with large datasets. …”
Get full text
Get full text
Get full text
masterThesis -
11
-
12
Predicting Dropouts among a Homogeneous Population using a Data Mining Approach
Published 2019“…Our research relies solely on pre-college and college performance data available in the institutional database. Our research reveals that the Gradient Boosted Trees is a robust algorithm that predicts dropouts with an accuracy of 79.31% and AUC of 88.4% using only pre-enrollment data. …”
Get full text
-
13
Predicting the Heats of Fusion of Ionic Liquids via Group Contribution Modeling and Machine Learning
Published 2022Get full text
doctoralThesis -
14
-
15
Automatic Video Summarization Using HEVC and CNN Features
Published 2022Get full text
doctoralThesis -
16
BUC algorithm for iceberg cubes
Published 2003“…The Iceberg-Cube problem restricts the computation of the data cube to only those group-by partitions satisfying a minimum threshold condition defined on a specified measure. …”
Get full text
Get full text
Get full text
conferenceObject -
17
Development of a deep learning-based group contribution framework for targeted design of ionic liquids
Published 2024“…<p dir="ltr">In this article, we present a novel deep learning-based group contribution framework for the targeted design of ionic liquids (ILs). …”
-
18
Social spider optimization algorithm: survey and new applications
Published 2024“…One of the PSO algorithms or versions is the social spider optimization (SSO) algorithm, a simulation of the interaction between spider groups, males and females. …”
Get full text
-
19
(k, l)-Clustering for Transactional Data Streams Anonymization
Published 2018“…In this paper, we address the correlation problem in the anonymization of transactional data streams. We propose a bucketization-based technique, entitled (k, l)-clustering to prevent such privacy breaches by ensuring that the same k individuals remain grouped together over the entire anonymized stream. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
20
Mining airline data for CRM strategies. (c2006)
Published 2006Get full text
Get full text
masterThesis