بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
mold algorithm » mould algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
mold algorithm » mould algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
-
1
Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm
منشور في 2022"…Moreover, the image pixels in different and more similar areas of the image are located next to one another in a group and classified using the specified thresholds. As a result, the embedding capacity in each class can increase by reducing the value of the difference between two consecutive pixels, and the distortion of the marked image can decrease after inserting the personal data using the DE method. …"
احصل على النص الكامل
-
2
Web Based Online Hybrid Teaching Method of Network Music Course
منشور في 2022"…Based on Web data mining, an improved algorithm of hybrid hierarchical recommendation algorithm and genetic algorithm is used in the experiment, and compared with the other two algorithms in the experiment. …"
احصل على النص الكامل
-
3
Augmented arithmetic optimization algorithm using opposite-based learning and lévy flight distribution for global optimization and data clustering
منشور في 2022الموضوعات: "…Arithmetic optimization algorithm (AOA)…"
-
4
A Hash-Based Assessment and Recovery Algorithm for Distributed Healthcare Systems Using Blockchain Technology
منشور في 2020"…Numerous damage assessment and recovery algorithms have been proposed in the literature. In this work, we present a distributed algorithm that uses blockchain technology and hash tables to solve the information warfare problem in healthcare systems. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
5
Cryptocurrency Exchange Market Prediction and Analysis Using Data Mining and Artificial Intelligence
منشور في 2020"…One of the best algorithms in terms of the result is the Long Short Term Memory (LSTM) since it is based on recurrent neural networks which uses loop as a method to learn from heuristics data. …"
احصل على النص الكامل
-
6
Multimodal EEG and Keystroke Dynamics Based Biometric System Using Machine Learning Algorithms
منشور في 2021"…We also developed a binary template matching-based algorithm, which gives 93.64% accuracy 6X faster. …"
-
7
An Effective Hash Based Assessment and Recovery Algorithm for Healthcare Systems
منشور في 2019"…Finally, the experimental results prove the improvements provided by our hash based algorithm over previously suggested models.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
8
A neural networks algorithm for data path synthesis
منشور في 2003"…This paper presents a deterministic parallel algorithm to solve the data path allocation problem in high-level synthesis. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
9
Data reductions and combinatorial bounds for improved approximation algorithms
منشور في 2016"…Kernelization algorithms in the context of Parameterized Complexity are often based on a combination of data reduction rules and combinatorial insights. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
10
-
11
Physical optimization algorithms for mapping data to distributed-memory multiprocessors
منشور في 1992"…We present three parallel physical optimization algorithms for mapping data to distributed-memory multiprocessors, concentrating on irregular loosely synchronous problems. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
12
Efficient Approximate Conformance Checking Using Trie Data Structures
منشور في 2021"…By encoding the proxy behavior using a trie data structure, we obtain a logarithmically reduced search space for alignment computation compared to a set-based representation. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
13
-
14
-
15
Data damage assessment and recovery algorithm from malicious attacks in healthcare data sharing systems
منشور في 2016"…Hence, this presents a need for fast and efficient damage assessment and recovery algorithms. In this paper, we present an efficient data damage assessment and recovery algorithm to delete malicious transactions and recover affected transactions in a data source in a health care system based on the concept of the matrix. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
16
Methodology for Analyzing the Traditional Algorithms Performance of User Reviews Using Machine Learning Techniques
منشور في 2020"…<p dir="ltr">Android-based applications are widely used by almost everyone around the globe. …"
-
17
A comparison of data mapping algorithms for parallel iterative PDE solvers
منشور في 1995"…We review and evaluate the performances of six data mapping algorithms used for parallel single-phase iterative PDE solvers with irregular 2-dimensional meshes on multicomputers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
18
How can algorithms help in segmenting users and customers? A systematic review and research agenda for algorithmic customer segmentation
منشور في 2023"…<p dir="ltr">What algorithm to choose for customer segmentation? Should you use one algorithm or many? …"
-
19
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
منشور في 2022"…There are a variety of ways in which AI technology can aid in the growth and profitability of a variety of industries. Such data can be parsed using ML and AI approaches in designed to check attacks on CPSs. …"
احصل على النص الكامل
احصل على النص الكامل
-
20
Data of simulation model for photovoltaic system's maximum power point tracking using sequential Monte Carlo algorithm
منشور في 2024"…The model aims to compare the performance of classical perturb and observe (P&O) algorithm, particle swarm optimization (PSO) algorithm, flower pollination algorithm (FPA), and SMC-based tracking techniques. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article