بدائل البحث:
encoding algorithm » cosine algorithm (توسيع البحث)
hiding algorithm » scheduling algorithm (توسيع البحث), cosine algorithm (توسيع البحث)
data hiding » data mining (توسيع البحث)
search » research (توسيع البحث)
encoding algorithm » cosine algorithm (توسيع البحث)
hiding algorithm » scheduling algorithm (توسيع البحث), cosine algorithm (توسيع البحث)
data hiding » data mining (توسيع البحث)
search » research (توسيع البحث)
-
1
Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm
منشور في 2022"…Researchers have scrutinized data hiding schemes in recent years. Data hiding in standard images works well, but does not provide satisfactory results in distortion-sensitive medical, military, or forensic images. …"
احصل على النص الكامل
-
2
Efficient Approximate Conformance Checking Using Trie Data Structures
منشور في 2021الموضوعات: "…Estimation error,Runtime,Computational modeling,Data structures,Approximation algorithms,Encoding,Computational efficiency…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
3
-
4
The unified effect of data encoding, ansatz expressibility and entanglement on the trainability of HQNNs
منشور في 2023"…We focus on the combined influence of data encoding, qubit entanglement, and ansatz expressibility in hybrid quantum neural networks (HQNNs) for multi-class classification tasks. …"
-
5
Extended Behavioral Modeling of FET and Lattice-Mismatched HEMT Devices
منشور في 2016الموضوعات: احصل على النص الكامل
doctoralThesis -
6
On the Optimization of Band Gaps in Periodic Waveguides
منشور في 2025"…<h3 dir="ltr">Purpose</h3><p dir="ltr">This work applies a computational framework for vibration attenuation in periodic structures by combining the established wave and finite element (WFE) method with nature-inspired optimization algorithms. …"
-
7
A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks
منشور في 2022"…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …"
-
8
Adaptive bias simulated evolution algorithm for placement
منشور في 2001"…This parameter has major impact on the algorithm run-time and the quality of the solution subspace searched. …"
احصل على النص الكامل
احصل على النص الكامل
article -
9
Fuzzy simulated evolution algorithm for topology design of campusnetworks
منشور في 2000"…To diversify the search, we have also incorporated tabu search-based characteristics in the allocation phase of the SE algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
article -
10
A FUZZY EVOLUTIONARY ALGORITHM FOR TOPOLOGY DESIGN OF CAMPUS NETWORKS
منشور في 2020"…To intensify the search, we have also incorporated Tabu Search-based characteristics in the allocation phase of the SE algorithm. …"
احصل على النص الكامل
article -
11
Evolutionary algorithms for state justification in sequential automatic test pattern generation
منشور في 2005"…Evolutionary algorithms have been effective in solving many search and optimization problems. …"
احصل على النص الكامل
article -
12
Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm
منشور في 2022"…The antecedent part parameters (Gaussian membership function parameters) are encoded as a population of artificial swarm of grasshoppers and optimized using its algorithm. …"
-
13
Inertial Navigation system of In-pipe Inspection Robot
منشور في 2016احصل على النص الكامل
doctoralThesis -
14
Socially Motivated Approach to Simulate Negotiation Process
منشور في 2014احصل على النص الكامل
doctoralThesis -
15
Autonomous Demand-Side Management in the Future Smart Grid
منشور في 2016احصل على النص الكامل
doctoralThesis -
16
Bird’s Eye View feature selection for high-dimensional data
منشور في 2023"…BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …"
-
17
A Fuzzy Low-Dimensional Intersection Graph Representation Approach for Graph Compression and Anonymization
منشور في 2021"…The large amount of data represented as a network, or graph, sometimes exceeds the resources of a conventional computing device. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
18
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
منشور في 2024"…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …"
-
19
-
20
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
منشور في 2022"…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
احصل على النص الكامل