بدائل البحث:
modbo algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
modbo algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
-
61
Properties of simulated annealing and genetic algorithms for mapping data to multicomputers
منشور في 1997"…Some user parameters are included in the objective function and are architecture- or problem-dependent parameters. The others are used in the GA and SA algorithms. The fault tolerance capability is demonstrated by mapping data to a multicomputer with some faulty processors. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
62
-
63
Spectrum Sensing Algorithms for Cooperative Cognitive Radio Networks
منشور في 2010احصل على النص الكامل
doctoralThesis -
64
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
منشور في 2022"…To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …"
-
65
-
66
Wearable wrist to finger photoplethysmogram translation through restoration using super operational neural networks based 1D-CycleGAN for enhancing cardiovascular monitoring
منشور في 2024"…TTR-GAN comprises cascaded dual-stage 1D Cycle Generative Adversarial Networks (1D-CycleGANs) constructed using Super-ONNs. …"
-
67
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
منشور في 2022"…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …"
-
68
-
69
-
70
-
71
-
72
A comparison of data mapping algorithms for parallel iterative PDE solvers
منشور في 1995"…We review and evaluate the performances of six data mapping algorithms used for parallel single-phase iterative PDE solvers with irregular 2-dimensional meshes on multicomputers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
73
An enhanced k-means clustering algorithm for pattern discovery in healthcare data
منشور في 2015"…This paper studies data mining applications in healthcare. Mainly, we study k-means clustering algorithms on large datasets and present an enhancement to k-means clustering, which requires k or a lesser number of passes to a dataset. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
74
Efficient Dynamic Cost Scheduling Algorithm for Financial Data Supply Chain
منشور في 2021"…The primary tool used in the data supply chain is data batch processing which requires efficient scheduling. …"
احصل على النص الكامل
article -
75
DG-Means – A Superior Greedy Algorithm for Clustering Distributed Data
منشور في 2022"…In this work, we present DG-means, which is a greedy algorithm that performs on distributed sets of data. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
76
Data Redundancy Management in Connected Environments
منشور في 2020"…., building) equipped with sensors that produce and exchange raw data. Although the sensed data is considered to contain useful and valuable information, yet it might include various inconsistencies such as data redundancies, anomalies, and missing values. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
77
-
78
-
79
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
منشور في 2022"…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
احصل على النص الكامل
-
80
A Parallel Neural Networks Algorithm for the Clique Partitioning Problem
منشور في 2002"…Our model uses a large number of simple processing elements or neurons, based on the McCulloch-Pitts binary neuron. The proposed algorithm has a time complexity of O(1) for a neural network with n vertices and c cliques. …"
احصل على النص الكامل
احصل على النص الكامل
article