يعرض 281 - 300 نتائج من 903 نتيجة بحث عن '(( elements per algorithm ) OR ((( data using algorithm ) OR ( tests using algorithm ))))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 281

    A Comparative Study of Elgamal Based Cryptographic Algorithms حسب Haraty, Ramzi A.

    منشور في 2004
    "…To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  2. 282
  3. 283
  4. 284

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts حسب ALSHAMSI, SUROUR

    منشور في 2022
    "…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
    احصل على النص الكامل
  5. 285

    Global smart cities classification using a machine learning approach to evaluating livability, technology, and sustainability performance across key urban indices حسب Aya Hasan Alkhereibi (17151070)

    منشور في 2025
    "…Drawing on data from the Smart Cities Index (SCI) and other economic and sustainability competitiveness metrics, the study uses various <u>ML algorithms</u> to categorize cities into <u>performance classes</u>, ranging from high-achieving Class 1 to emerging Class 3 cities. …"
  6. 286
  7. 287
  8. 288

    IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture حسب Moutaz Alazab (17730060)

    منشور في 2025
    "…The IoMT manufacturers need to offer their products at a competitive price, which forces them to use simplified architecture, leaving limited and, to some extent, no scope to employ sophisticated cybersecurity algorithms. …"
  9. 289

    A comparison of optimization heuristics for the data mapping problem حسب Mansour, Nashat

    منشور في 1997
    "…In this paper we compare the performance of six heuristics with suboptimal solutions for the data mapping problem of two dimensional meshes that are used for the numerical solution of Partial Differential Equations(PDEs) on multicomputers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 290

    Data redundancy management for leaf-edges in connected environments حسب Mansour, Elio

    منشور في 2022
    "…Although the sensed data could be useful for various applications (e.g., event detection in cities, energy management in commercial buildings), it first requires pre-processing to clean various inconsistencies (e.g., anomalies, redundancies, missing values). …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 291

    Prediction the performance of multistage moving bed biological process using artificial neural network (ANN) حسب Fares Almomani (12585685)

    منشور في 2020
    "…The effect of surface area loading rate (SALR), organic matters (OMs), nutrients (N & P), feed flow rate (Q<sub>feed</sub>), hydraulic retention time (HRT), and internal recycle flow (IRF) on the performance of the ENR-BP to fulfil rigorous discharge limitations were evaluated. Experimental data was used to develop the appropriate architecture for the AAN using iterative steps of training and testing. …"
  12. 292

    A Digital DNA Sequencing Engine for Ransomware Analysis using a Machine Learning Network حسب KHAN, FIROZ

    منشور في 2020
    "…A newly collected dataset after feature selection is used to generate the DNA sequence. In the final phase, the new dataset is trained using active learning concept, and the test data is generated using a random DNA sequence method. …"
    احصل على النص الكامل
  13. 293

    Cognitive Load Estimation Using a Hybrid Cluster-Based Unsupervised Machine Learning Technique حسب Iqbal Hassan (22155274)

    منشور في 2024
    "…In this study, we harnessed the capabilities of a four-channel, wearable EEG device that captured brain activity data during two distinct CL states: Baseline (representing a non-CL, resting state) and the Stroop Test (a CL-inducing state). …"
  14. 294
  15. 295

    Natural optimization algorithms for the cross-dock door assignment problem حسب Tarhini, Abbas A.

    منشور في 2016
    "…A lot of research has been conducted regarding this topic; still, up to our knowledge, none used scatter search (SS). This paper modifies a classical mathematical model that represents the CDAP and implements an evolutionary metaheuristic SS algorithm and tests it and then compares the results with those of another evolutionary algorithm, i.e., genetic algorithm (GA). …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 296
  17. 297

    Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures حسب Leduc, Guillaume

    منشور في 2025
    "…To determine the parameters of the regime switching model and identify when economic states change, we employ the EM algorithm, utilizing real gas futures price data. We validate our closed-form solution for the option pricing through simulations employing the generalized antithetic variates Monte-Carlo technique. …"
    احصل على النص الكامل
    article
  18. 298

    A fast exact sequential algorithm for the partial digest problem حسب Mostafa M. Abbas (17058093)

    منشور في 2016
    "…Two types of simulated data, random and Zhang, are used to measure the efficiency of the algorithm. …"
  19. 299
  20. 300

    Data mining approach to predict student's selection of program majors حسب SIDDARTHA, SHARMILA

    منشور في 2019
    "…The approach includes a methodology to manage data mining projects, sampling techniques to handle imbalanced data and multiclass data, a set of classification algorithms to predict and measures to evaluate performance of models. …"
    احصل على النص الكامل