Search alternatives:
cosine algorithm » colony algorithm (Expand Search)
code algorithm » rd algorithm (Expand Search), colony algorithm (Expand Search)
based cosine » based online (Expand Search)
Showing 21 - 40 results of 72 for search '(( elements network algorithm ) OR ((( data code algorithm ) OR ( based cosine algorithm ))))', query time: 0.13s Refine Results
  1. 21

    Enhancing Breast Cancer Diagnosis With Bidirectional Recurrent Neural Networks: A Novel Approach for Histopathological Image Multi-Classification by Rajendra Babu Chikkala (22330876)

    Published 2025
    “…In this study, we introduce an innovative method for the multi-classification of breast cancer histopathological images utilizing Bidirectional Recurrent Neural Networks (BRNN). The BRNN structure consists of four unique elements: the backbone branch for transfer learning, the Gated Recurrent Unit (GRU), the residual collaborative branch, and the feature fusion module. …”
  2. 22

    Oversampling techniques for imbalanced data in regression by Samir Brahim Belhaouari (9427347)

    Published 2024
    “…For such high-dimension data our approach outperforms the Synthetic Minority Oversampling Technique for Regression (SMOTER) algorithm for the IMDB-WIKI and AgeDB image datasets. …”
  3. 23
  4. 24
  5. 25

    Fuzzy simulated evolution algorithm for topology design of campusnetworks by Youssef, H.

    Published 2000
    “…We present an approach based on the simulated evolution algorithm for the design of campus network topology. …”
    Get full text
    Get full text
    article
  6. 26
  7. 27
  8. 28

    Nonlinear analysis of shell structures using image processing and machine learning by M.S. Nashed (16392961)

    Published 2023
    “…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …”
  9. 29

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach by Sarif, Bambang

    Published 2006
    “…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …”
    Get full text
    Get full text
    article
  10. 30
  11. 31
  12. 32

    Joint energy-distortion aware algorithms for cooperative video streaming over LTE networks by Yaacoub, Elias

    Published 2013
    “…Videos with single description coding (SDC), multiple description coding (MDC), and scalable video coding (SVC) are considered. …”
    Get full text
    Get full text
    Get full text
    article
  13. 33

    Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators by Abu Zitar, Raed

    Published 2021
    “…The outcomes of the DNA microarray is a table/matrix, called gene expression data. Pattern recognition algorithms are widely applied to gene expression data to differentiate between health and cancerous patient samples. …”
    Get full text
  14. 34

    Molecular Classification of Breast Cancer Utilizing Long Non-Coding RNA (lncRNA) Transcriptomes Identifies Novel Diagnostic lncRNA Panel for Triple-Negative Breast Cancer by Hibah Shaath (5599658)

    Published 2021
    “…The identification of long non-coding RNAs (lncRNAs) and the roles they play in cancer progression has recently proven to be beneficial. …”
  15. 35
  16. 36

    Practical Multiple Node Failure Recovery in Distributed Storage Systems by Itani, M.

    Published 2016
    “…The fractional repetition (FR) code is a class of regenerating codes that consists of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  17. 37

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …”
  18. 38
  19. 39
  20. 40

    Integrated whole transcriptome and small RNA analysis revealed multiple regulatory networks in colorectal cancer by Hibah Shaath (5599658)

    Published 2021
    “…Additionally, potential interaction between differentially expressed lncRNAs such as H19, SNHG5, and GATA2-AS1 with multiple miRNAs has been revealed. Taken together, our data provides thorough analysis of dysregulated protein-coding and non-coding RNAs in CRC highlighting numerous associations and regulatory networks thus providing better understanding of CRC.…”