Showing 121 - 140 results of 431 for search '(( element network algorithm ) OR ((( data could algorithm ) OR ( based network algorithm ))))', query time: 0.13s Refine Results
  1. 121
  2. 122
  3. 123
  4. 124

    Data reductions and combinatorial bounds for improved approximation algorithms by Abu-Khzam, Faisal N.

    Published 2016
    “…Kernelization algorithms in the context of Parameterized Complexity are often based on a combination of data reduction rules and combinatorial insights. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 125

    Data redundancy management for leaf-edges in connected environments by Mansour, Elio

    Published 2022
    “…Although the sensed data could be useful for various applications (e.g., event detection in cities, energy management in commercial buildings), it first requires pre-processing to clean various inconsistencies (e.g., anomalies, redundancies, missing values). …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  6. 126

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices by Neder Karmous (19743430)

    Published 2024
    “…IoT devices share, collect, and exchange data via the internet, wireless networks, or other networks with one another. …”
  7. 127

    Information warfare. (c2015) by Sai, Mohamed El

    Published 2015
    “…While preventive measures could be overcome and detection measures could detect an attack late after damage has occurred, there is a need for a recovery algorithm that will recover the database to its correct state before the attack has taken place. …”
    Get full text
    Get full text
    masterThesis
  8. 128

    An Effective Fault Diagnosis Technique for Wind Energy Conversion Systems Based on an Improved Particle Swarm Optimization by Majdi Mansouri (16869885)

    Published 2022
    “…First, an efficient feature selection algorithm based on particle swarm optimization (PSO) is proposed. …”
  9. 129
  10. 130

    Improving the security of SNMP in wireless networks by Otrok, H.

    Published 2017
    “…Simple network management protocol (SNMP) is widely used for monitoring and managing computers and network devices on wired and wireless network. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  11. 131

    Parallel physical optimization algorithms for allocating data to multicomputer nodes by Mansour, Nashat

    Published 1994
    “…They are based on simulated annealing, neural networks and genetic algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  12. 132

    Physical optimization algorithms for mapping data to distributed-memory multiprocessors by Mansour, Nashat

    Published 1992
    “…We also present a technique for efficient mapping of large data sets. The algorithms include a parallel genetic algorithm (PGA), a parallel neural network algorithm (PNN) and a parallel simulated annealing algorithm (PSA). …”
    Get full text
    Get full text
    Get full text
    masterThesis
  13. 133

    Modulation With Metaheuristic Approach for Cascaded-MPUC49 Asymmetrical Inverter With Boosted Output by Kaif Ahmed Lodi (16855518)

    Published 2020
    “…For the calculation of optimum angles, a meta-heuristic based Genetic Algorithm (GA) technique is employed. …”
  14. 134

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology by Al-Hemairy, Moh'd Hussain

    Published 2010
    “…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
    Get full text
  15. 135

    Wearable wrist to finger photoplethysmogram translation through restoration using super operational neural networks based 1D-CycleGAN for enhancing cardiovascular monitoring by Sakib Mahmud (15302404)

    Published 2024
    “…TTR-GAN comprises cascaded dual-stage 1D Cycle Generative Adversarial Networks (1D-CycleGANs) constructed using Super-ONNs. …”
  16. 136
  17. 137

    The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions by Abdulmalik Alwarafy (17984104)

    Published 2022
    “…The advantages, limitations, and use-cases for each algorithm are provided. We then conduct a comprehensive and in-depth literature review and classify existing related works based on both the radio resources they are addressing and the type of wireless networks they are investigating. …”
  18. 138

    Cryptocurrency Exchange Market Prediction and Analysis Using Data Mining and Artificial Intelligence by Al Rayhi, Nasser

    Published 2020
    “…One of the best algorithms in terms of the result is the Long Short Term Memory (LSTM) since it is based on recurrent neural networks which uses loop as a method to learn from heuristics data. …”
    Get full text
  19. 139
  20. 140

    Cross entropy error function in neural networks by Nasr, G.E.

    Published 2002
    “…The cross entropy function is proven to accelerate the backpropagation algorithm and to provide good overall network performance with relatively short stagnation periods. …”
    Get full text
    Get full text
    Get full text
    conferenceObject