Search alternatives:
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
Showing 141 - 160 results of 683 for search '(( element network algorithm ) OR ((( data based algorithm ) OR ( solved using algorithm ))))', query time: 0.11s Refine Results
  1. 141

    TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection by Zina Chkirbene (16869987)

    Published 2020
    “…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …”
  2. 142

    Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval by Mohammed Tahar Habib Kaib (21633176)

    Published 2024
    “…Generally, RKPCA reduces the number of samples in the training data set and then builds the KPCA model based on this data set. …”
  3. 143
  4. 144
  5. 145

    Optimum sensors allocation for drones multi-target tracking under complex environment using improved prairie dog optimization by Abu Zitar, Raed

    Published 2024
    “…The IPDOA performance was compared with the other 8 metaheuristic optimization algorithms and the testing showed its superiority over those techniques for solving this complex problem. …”
    Get full text
  6. 146

    Enhancing Breast Cancer Diagnosis With Bidirectional Recurrent Neural Networks: A Novel Approach for Histopathological Image Multi-Classification by Rajendra Babu Chikkala (22330876)

    Published 2025
    “…In this study, we introduce an innovative method for the multi-classification of breast cancer histopathological images utilizing Bidirectional Recurrent Neural Networks (BRNN). The BRNN structure consists of four unique elements: the backbone branch for transfer learning, the Gated Recurrent Unit (GRU), the residual collaborative branch, and the feature fusion module. …”
  7. 147

    Robust Control Of Sampled Data Systems by AL-Sunni, Fouad

    Published 2020
    “…They then present a numerical controller design algorithm based on the derived bounds. Examples are used for demonstration.…”
    Get full text
    article
  8. 148

    Robust control of sampled data systems by Al-Sunni, F.M.

    Published 1998
    “…They then present a numerical controller design algorithm based on the derived bounds. Examples are given for demonstration…”
    Get full text
    Get full text
    article
  9. 149

    Robust Control Of Sampled Data Systems by AL-Sunni, Fouad

    Published 2020
    “…They then present a numerical controller design algorithm based on the derived bounds. Examples are used for demonstration.…”
    Get full text
    article
  10. 150

    Robust Control Of Sampled Data Systems by AL-Sunni, Fouad

    Published 2020
    “…They then present a numerical controller design algorithm based on the derived bounds.Examples are used for demonstration.…”
    Get full text
    article
  11. 151

    Bee Colony Algorithm for Proctors Assignment. by Mansour, Nashat

    Published 2015
    “…The Bee Colony algorithm is a recent population-based search algorithm that mimics the natural behavior of swarms of honey bees during the process of collecting food. …”
    Get full text
    Get full text
    Get full text
    article
  12. 152
  13. 153

    Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn... by Mohamed, AlShuweihi

    Published 2020
    “…A special consideration was given to data pre-processing and dimensionality reduction such Chi Squared (CS) and Recursive Feature Elimination (RFE) to improve progressively the proposed models performance. …”
    Get full text
  14. 154

    Data Redundancy Management in Connected Environments by Mansour, Elio

    Published 2020
    “…We describe its modules, and clustering-based algorithms. Moreover, our proposal detects temporal, and spatial-temporal redundancies in order to consider both static and mobile devices/sensors. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 155

    Unsupervised outlier detection in multidimensional data by Atiq ur Rehman (14153391)

    Published 2022
    “…<p>Detection and removal of outliers in a dataset is a fundamental preprocessing task without which the analysis of the data can be misleading. Furthermore, the existence of anomalies in the data can heavily degrade the performance of machine learning algorithms. …”
  16. 156

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment by Zakaria Tolba (16904718)

    Published 2022
    “…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
  17. 157

    A simulated annealing algorithm for unit commitment by Mantawy, A.H.

    Published 1998
    “…This paper presents a simulated annealing algorithm (SAA) to solve the unit commitment problem (UCP). …”
    Get full text
    Get full text
    article
  18. 158
  19. 159

    An Uncertainty Based Genetic Algorithm Approach for Project Resource Scheduling by ALKETBI, SAIF

    Published 2016
    “…The work presented in thesis add to the existing literature in a proposing the use of a genetic algorithm uncertain approach to resource- scheduling in projects. …”
    Get full text
  20. 160