Search alternatives:
encoding algorithm » cosine algorithm (Expand Search)
hiding algorithm » scheduling algorithm (Expand Search), cosine algorithm (Expand Search)
per algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
element per » elementi per (Expand Search)
data hiding » data mining (Expand Search)
encoding algorithm » cosine algorithm (Expand Search)
hiding algorithm » scheduling algorithm (Expand Search), cosine algorithm (Expand Search)
per algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
element per » elementi per (Expand Search)
data hiding » data mining (Expand Search)
-
1
Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm
Published 2022“…Researchers have scrutinized data hiding schemes in recent years. Data hiding in standard images works well, but does not provide satisfactory results in distortion-sensitive medical, military, or forensic images. …”
Get full text
-
2
Efficient Approximate Conformance Checking Using Trie Data Structures
Published 2021Subjects: “…Estimation error,Runtime,Computational modeling,Data structures,Approximation algorithms,Encoding,Computational efficiency…”
Get full text
Get full text
Get full text
-
3
-
4
The unified effect of data encoding, ansatz expressibility and entanglement on the trainability of HQNNs
Published 2023“…We focus on the combined influence of data encoding, qubit entanglement, and ansatz expressibility in hybrid quantum neural networks (HQNNs) for multi-class classification tasks. …”
-
5
A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks
Published 2022“…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …”
-
6
Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm
Published 2022“…The antecedent part parameters (Gaussian membership function parameters) are encoded as a population of artificial swarm of grasshoppers and optimized using its algorithm. …”
-
7
-
8
A Fuzzy Low-Dimensional Intersection Graph Representation Approach for Graph Compression and Anonymization
Published 2021“…The large amount of data represented as a network, or graph, sometimes exceeds the resources of a conventional computing device. …”
Get full text
Get full text
Get full text
masterThesis -
9
Correlation Clustering with Overlaps
Published 2020“…We present a heuristic algorithm and a semi-exact algorithm for the Multi-Parameterized Cluster Editing with Vertex Splitting problem. …”
Get full text
Get full text
Get full text
masterThesis -
10
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
Published 2024“…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …”
-
11
Optimization of Commercially Off the Shelf (COTS) Electric Propulsion System for Low Speed Fuel Cell UAV
Published 2013Get full text
doctoralThesis -
12
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
Get full text
-
13
On the complexity of multi-parameterized cluster editing
Published 2017“…In other words, Cluster Editing can be solved efficiently when the number of false positives/negatives per single data element is expected to be small compared to the minimum cluster size. …”
Get full text
Get full text
Get full text
Get full text
article -
14
Digital Image Watermarking Using Balanced Multiwavelets
Published 2006“…The statistical model is based on a generalized Gaussian distribution. Limits of data hiding capacity clearly show that balanced multiwavelets provide higher watermarking rates. …”
Get full text
article -
15
Competitive learning/reflected residual vector quantization for coding angiogram images
Published 2003“…Medical images need to be compressed for the purpose of storage/transmission of a large volume of medical data. Reflected residual vector quantization (RRVQ) has emerged recently as one of the computationally cheap compression algorithms. …”
Get full text
Get full text
article -
16
Design and analysis of entropy-constrained reflected residual vector quantization
Published 2002“…Residual vector quantization (RVQ) is a vector quantization (VQ) paradigm which imposes structural constraints on the encoder in order to reduce the encoding search burden and memory storage requirements of an unconstrained VQ. …”
Get full text
Get full text
article -
17
Efficient Seismic Volume Compression using the Lifting Scheme
Published 2000“…In addition, the lifting scheme offers: 1) a dramatic reduction of the required auxiliary memory, 2) an efficient combination with parallel rendering algorithms to perform arbitrary surface and volume rendering for interactive visualization, and 3) an easy integration in the parallel I/O seismic data loading routines. …”
Get full text
article -
18
Multidimensional Gains for Stochastic Approximation
Published 2019“…The proposed algorithms here aim for per-iteration minimization of the mean square estimate error. …”
Get full text
Get full text
Get full text
Get full text
article -
19
PERF solutions for distributed query optimization. (c1999)
Published 1999Get full text
Get full text
masterThesis -
20
A Geometric-Primitives-Based Compression Scheme for Testing Systems-on-a-Chip
Published 2001“…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data.…”
Get full text
article