Search alternatives:
method algorithm » mould algorithm (Expand Search)
data detection » data injection (Expand Search)
Showing 101 - 120 results of 391 for search '(( elements method algorithm ) OR ((( data detection algorithm ) OR ( data including algorithm ))))', query time: 0.12s Refine Results
  1. 101
  2. 102

    A kernelization algorithm for d-Hitting Set by Abu-Khzam, Faisal N.

    Published 2010
    “…For 3-Hitting Set, an arbitrary instance is reduced into an equivalent one that contains at most 5k2+k elements. This kernelization is an improvement over previously known methods that guarantee cubic-order kernels. …”
    Get full text
    Get full text
    Get full text
    article
  3. 103
  4. 104
  5. 105
  6. 106

    Deepfakes Signatures Detection in the Handcrafted Features Space by Hamadene, Assia

    Published 2023
    “…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
    Get full text
  7. 107

    Information warfare. (c2015) by Sai, Mohamed El

    Published 2015
    “…In addition, we will implement the algorithm and compare its performance to other detection and recovery algorithms.…”
    Get full text
    Get full text
    masterThesis
  8. 108
  9. 109

    Using machine learning for disease detection. (c2013) by Jreij, Georges Antoun

    Published 2016
    “…Classification has three main components: the classification algorithm, the pre-classified data (training data) and the un-classified data (testing data). …”
    Get full text
    Get full text
    masterThesis
  10. 110

    Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements by Stefano Nardean (14151900)

    Published 2023
    “…<p dir="ltr">This work proposes an original preconditioner that couples the Constrained Pressure Residual (CPR) method with block preconditioning for the efficient solution of the linearized systems of equations arising from fully implicit multiphase flow models. …”
  11. 111

    Capturing outline of fonts using genetic algorithm and splines by Sarfraz, M.

    Published 2001
    “…We present a method to convert the original problem into a discrete combinatorial optimization problem and solve it by a genetic algorithm. We also incorporate a corner detection algorithm to detect significant points which are necessary to capture a pleasant looking spline fitting for shapes such as fonts. …”
    Get full text
    Get full text
    article
  12. 112

    Optimizing Document Classification: Unleashing the Power of Genetic Algorithms by Ghulam Mustafa (458105)

    Published 2023
    “…Researchers have utilized diverse data sources, such as citations, metadata, content, and hybrids, in their approaches.In these sources, the meta-data-based approach stands out for research paper classification due to its availability at no cost. …”
  13. 113

    GenDE: A CRF-Based Data Extractor by Kayed, Mohammed

    Published 2020
    “…Web site schema detection and data extraction from the Deep Web have been studied a lot. …”
    Get full text
    Get full text
  14. 114
  15. 115

    Evolutionary algorithm for predicting all-atom protein structure by Mansour, Nashat

    Published 2011
    “…We evaluate our algorithm on proteins taken from a Protein Data Bank. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  16. 116

    Social spider optimization algorithm: survey and new applications by Abualigah, Laith

    Published 2024
    “…This survey also studied the main applications of this algorithm in different fields, including medical, mathematical, artificial intelligence, engineering, and data engineering, and how this algorithm affected, impacted, and supported the different fields. …”
    Get full text
  17. 117

    Data redundancy management for leaf-edges in connected environments by Mansour, Elio

    Published 2022
    “…DRMF considers both static and mobile edge devices, and provides two algorithms for temporal and spatio-temporal redundancy detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  18. 118
  19. 119
  20. 120