يعرض 121 - 140 نتائج من 569 نتيجة بحث عن '(( elements method algorithm ) OR ((( data based algorithm ) OR ( data finding algorithm ))))', وقت الاستعلام: 0.16s تنقيح النتائج
  1. 121

    TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection حسب Zina Chkirbene (16869987)

    منشور في 2020
    "…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …"
  2. 122

    Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval حسب Mohammed Tahar Habib Kaib (21633176)

    منشور في 2024
    "…Generally, RKPCA reduces the number of samples in the training data set and then builds the KPCA model based on this data set. …"
  3. 123

    Defining quantitative rules for identifying influential researchers: Insights from mathematics domain حسب Ghulam Mustafa (458105)

    منشور في 2024
    "…<p>In the midst of a vast amount of scientific literature, the need for specific rules arise especially when it comes to deciding which impactful researchers should be nominated. These rules are based on measurable quantities that can easily be applied to a researcher's quantitative data. …"
  4. 124
  5. 125

    Robust Control Of Sampled Data Systems حسب AL-Sunni, Fouad

    منشور في 2020
    "…They then present a numerical controller design algorithm based on the derived bounds. Examples are used for demonstration.…"
    احصل على النص الكامل
    article
  6. 126

    Robust control of sampled data systems حسب Al-Sunni, F.M.

    منشور في 1998
    "…They then present a numerical controller design algorithm based on the derived bounds. Examples are given for demonstration…"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 127

    Robust Control Of Sampled Data Systems حسب AL-Sunni, Fouad

    منشور في 2020
    "…They then present a numerical controller design algorithm based on the derived bounds. Examples are used for demonstration.…"
    احصل على النص الكامل
    article
  8. 128

    Robust Control Of Sampled Data Systems حسب AL-Sunni, Fouad

    منشور في 2020
    "…They then present a numerical controller design algorithm based on the derived bounds.Examples are used for demonstration.…"
    احصل على النص الكامل
    article
  9. 129

    Stochastic Search Algorithms for Exam Scheduling حسب Mansour, Nashat

    منشور في 2007
    "…Then, we empirically compare the three proposed algorithms and FESP using realistic data. Our experimental results show that SA and GA produce good exam schedules that are better than those of FESP heuristic procedure. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 130
  11. 131

    Data Redundancy Management in Connected Environments حسب Mansour, Elio

    منشور في 2020
    "…We describe its modules, and clustering-based algorithms. Moreover, our proposal detects temporal, and spatial-temporal redundancies in order to consider both static and mobile devices/sensors. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  12. 132

    Unsupervised outlier detection in multidimensional data حسب Atiq ur Rehman (14153391)

    منشور في 2022
    "…<p>Detection and removal of outliers in a dataset is a fundamental preprocessing task without which the analysis of the data can be misleading. Furthermore, the existence of anomalies in the data can heavily degrade the performance of machine learning algorithms. …"
  13. 133

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment حسب Zakaria Tolba (16904718)

    منشور في 2022
    "…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …"
  14. 134
  15. 135

    A kernelization algorithm for d-Hitting Set حسب Abu-Khzam, Faisal N.

    منشور في 2010
    "…For 3-Hitting Set, an arbitrary instance is reduced into an equivalent one that contains at most 5k2+k elements. This kernelization is an improvement over previously known methods that guarantee cubic-order kernels. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 136

    Parallel genetic algorithm for disease-gene association حسب Mansour, Nashat

    منشور في 2011
    "…In this work, we combine few successful strategies from the literature and present a parallel genetic algorithm for the Tag SNP Selection problem. Our results compared favorably with those of a recognized tag SNP selection algorithm using three different data sets from the HapMap project.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  17. 137

    Particle swarm optimization algorithm: review and applications حسب Abualigah, Laith

    منشور في 2024
    "…Particle swarm optimization (PSO) is a heuristic global optimization technique and an optimization algorithm that is swarm intelligence-based. It is based on studies into the movement of bird flocks. …"
    احصل على النص الكامل
  18. 138

    Scatter Search algorithm for Protein Structure Prediction حسب Mansour, Nashat

    منشور في 2016
    "…In this paper, we present a Scatter Search (SS) algorithm for predicting 3D structures of proteins based on torsion angles representation. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 139
  20. 140