بدائل البحث:
modbo algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
يعرض 61 - 80 نتائج من 896 نتيجة بحث عن '(( elements modbo algorithm ) OR ((( data using algorithm ) OR ( based network algorithm ))))', وقت الاستعلام: 0.14s تنقيح النتائج
  1. 61

    Properties of simulated annealing and genetic algorithms for mapping data to multicomputers حسب Mansour, Nashat

    منشور في 1997
    "…Some user parameters are included in the objective function and are architecture- or problem-dependent parameters. The others are used in the GA and SA algorithms. The fault tolerance capability is demonstrated by mapping data to a multicomputer with some faulty processors. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 62
  3. 63
  4. 64

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method حسب Amit Kumar Balyan (18288964)

    منشور في 2022
    "…To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …"
  5. 65
  6. 66

    Wearable wrist to finger photoplethysmogram translation through restoration using super operational neural networks based 1D-CycleGAN for enhancing cardiovascular monitoring حسب Sakib Mahmud (15302404)

    منشور في 2024
    "…TTR-GAN comprises cascaded dual-stage 1D Cycle Generative Adversarial Networks (1D-CycleGANs) constructed using Super-ONNs. …"
  7. 67

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment حسب Zakaria Tolba (16904718)

    منشور في 2022
    "…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …"
  8. 68
  9. 69
  10. 70
  11. 71
  12. 72

    A comparison of data mapping algorithms for parallel iterative PDE solvers حسب Mansour, Nashat

    منشور في 1995
    "…We review and evaluate the performances of six data mapping algorithms used for parallel single-phase iterative PDE solvers with irregular 2-dimensional meshes on multicomputers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 73

    An enhanced k-means clustering algorithm for pattern discovery in healthcare data حسب Haraty, Ramzi A.

    منشور في 2015
    "…This paper studies data mining applications in healthcare. Mainly, we study k-means clustering algorithms on large datasets and present an enhancement to k-means clustering, which requires k or a lesser number of passes to a dataset. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 74

    Efficient Dynamic Cost Scheduling Algorithm for Financial Data Supply Chain حسب Al Sadawi, Alia

    منشور في 2021
    "…The primary tool used in the data supply chain is data batch processing which requires efficient scheduling. …"
    احصل على النص الكامل
    article
  15. 75

    DG-Means – A Superior Greedy Algorithm for Clustering Distributed Data حسب Assaf, Ali

    منشور في 2022
    "…In this work, we present DG-means, which is a greedy algorithm that performs on distributed sets of data. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  16. 76

    Data Redundancy Management in Connected Environments حسب Mansour, Elio

    منشور في 2020
    "…., building) equipped with sensors that produce and exchange raw data. Although the sensed data is considered to contain useful and valuable information, yet it might include various inconsistencies such as data redundancies, anomalies, and missing values. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  17. 77
  18. 78
  19. 79

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts حسب ALSHAMSI, SUROUR

    منشور في 2022
    "…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
    احصل على النص الكامل
  20. 80

    A Parallel Neural Networks Algorithm for the Clique Partitioning Problem حسب Harmanani, Haidar M.

    منشور في 2002
    "…Our model uses a large number of simple processing elements or neurons, based on the McCulloch-Pitts binary neuron. The proposed algorithm has a time complexity of O(1) for a neural network with n vertices and c cliques. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article