Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
element » elements (Expand Search)
mould » could (Expand Search), would (Expand Search), mold (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
element » elements (Expand Search)
mould » could (Expand Search), would (Expand Search), mold (Expand Search)
-
1
Multi-Objective Optimisation of Injection Moulding Process for Dashboard Using Genetic Algorithm and Type-2 Fuzzy Neural Network
Published 2024“…Additionally, the multi-objective genetic algorithm (MOGA) was utilised to extract the most optimal parameters for the injection moulding process, aiming to minimise shear and residual stress and thereby increase the resistance of the final product. …”
-
2
-
3
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
Published 2023“…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …”
-
4
-
5
Hardening the ElGamal cryptosystem in the setting of the second group of units. (c2011)
Published 2011Get full text
Get full text
masterThesis -
6
Variable Selection in Data Analysis: A Synthetic Data Toolkit
Published 2024“…Variable (feature) selection plays an important role in data analysis and mathematical modeling. This paper aims to address the significant lack of formal evaluation benchmarks for feature selection algorithms (FSAs). …”
Get full text
article -
7
CNN and HEVC Video Coding Features for Static Video Summarization
Published 2022Get full text
article -
8
-
9
-
10
Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm
Published 2022“…Researchers have scrutinized data hiding schemes in recent years. Data hiding in standard images works well, but does not provide satisfactory results in distortion-sensitive medical, military, or forensic images. …”
Get full text
-
11
A Survey of Data Clustering Techniques
Published 2023“…Clustering, an unsupervised learning technique, aims to identify a specific number of clusters to effectively categorize the data through data grouping. Hence, clustering is related to many fields and is used in various applications that deal with large datasets. …”
Get full text
Get full text
Get full text
masterThesis -
12
-
13
Predicting Dropouts among a Homogeneous Population using a Data Mining Approach
Published 2019“…Our research relies solely on pre-college and college performance data available in the institutional database. Our research reveals that the Gradient Boosted Trees is a robust algorithm that predicts dropouts with an accuracy of 79.31% and AUC of 88.4% using only pre-enrollment data. …”
Get full text
-
14
Predicting the Heats of Fusion of Ionic Liquids via Group Contribution Modeling and Machine Learning
Published 2022Get full text
doctoralThesis -
15
-
16
Automatic Video Summarization Using HEVC and CNN Features
Published 2022Get full text
doctoralThesis -
17
BUC algorithm for iceberg cubes
Published 2003“…The Iceberg-Cube problem restricts the computation of the data cube to only those group-by partitions satisfying a minimum threshold condition defined on a specified measure. …”
Get full text
Get full text
Get full text
conferenceObject -
18
Development of a deep learning-based group contribution framework for targeted design of ionic liquids
Published 2024“…<p dir="ltr">In this article, we present a novel deep learning-based group contribution framework for the targeted design of ionic liquids (ILs). …”
-
19
Social spider optimization algorithm: survey and new applications
Published 2024“…One of the PSO algorithms or versions is the social spider optimization (SSO) algorithm, a simulation of the interaction between spider groups, males and females. …”
Get full text
-
20
(k, l)-Clustering for Transactional Data Streams Anonymization
Published 2018“…In this paper, we address the correlation problem in the anonymization of transactional data streams. We propose a bucketization-based technique, entitled (k, l)-clustering to prevent such privacy breaches by ensuring that the same k individuals remain grouped together over the entire anonymized stream. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject