Search alternatives:
processing algorithm » processing algorithms (Expand Search)
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
search » research (Expand Search)
processing algorithm » processing algorithms (Expand Search)
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
search » research (Expand Search)
-
181
-
182
-
183
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
Published 2022“…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
-
184
Process Mining over Unordered Event Streams
Published 2020“…This requires online algorithms that, instead of keeping the whole history of event data, work incrementally and update analysis results upon the arrival of new events. …”
Get full text
Get full text
Get full text
-
185
-
186
Adaptive bias simulated evolution algorithm for placement
Published 2001“…This parameter has major impact on the algorithm run-time and the quality of the solution subspace searched. …”
Get full text
Get full text
article -
187
Mapping realistic data sets on parallel computers
Published 1993Get full text
Get full text
Get full text
Get full text
conferenceObject -
188
Nonlinear analysis of shell structures using image processing and machine learning
Published 2023“…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …”
-
189
The Effects of Data Mining on Small Businesses in Dubai
Published 2011“…While there are numerous studies on the best data mining models and their uses, even on certain industries, this study focuses on the applications more than the algorithms and models and their usefulness for small businesses specifically. …”
Get full text
-
190
Spider monkey optimizations: application review and results
Published 2024“…Optimization algorithms are applied to find efficient solutions in different problems in several fields such as the routing in wireless networks, cloud computing, big data, image processing and scheduling, and so forth. …”
Get full text
-
191
Fuzzy simulated evolution algorithm for topology design of campusnetworks
Published 2000“…To diversify the search, we have also incorporated tabu search-based characteristics in the allocation phase of the SE algorithm. …”
Get full text
Get full text
article -
192
Recent Advances of Chimp Optimization Algorithm: Variants and Applications
Published 2023“…Chimp Optimization Algorithm (ChOA) is one of the recent metaheuristics swarm intelligence methods. …”
Get full text
-
193
-
194
Optimizing Document Classification: Unleashing the Power of Genetic Algorithms
Published 2023“…Additionally, our proposed model optimizes the features using a genetic algorithm. …”
-
195
Application of Data Mining to Predict and Diagnose Diabetic Retinopathy
Published 2024Get full text
doctoralThesis -
196
Evolutionary algorithm for predicting all-atom protein structure
Published 2011“…We present an improved version of a scatter search (SS) algorithm for predicting all-atoms protein structures using a recent energy model. …”
Get full text
Get full text
Get full text
conferenceObject -
197
Capturing outline of fonts using genetic algorithm and splines
Published 2001“…In order to obtain a good spline model from large measurement data, we frequently have to deal with knots as variables, which becomes a continuous, non-linear and multivariate optimization problem with many local optima. …”
Get full text
Get full text
article -
198
A hybrid graph representation for recursive backtracking algorithms
Published 2017“…The performance of these algorithms often suffers from the increasing number of graph modifications, such as deletions, that reduce the problem instance and have to be “taken back” frequently during the search process. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
199
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
Get full text
-
200
A FUZZY EVOLUTIONARY ALGORITHM FOR TOPOLOGY DESIGN OF CAMPUS NETWORKS
Published 2020“…To intensify the search, we have also incorporated Tabu Search-based characteristics in the allocation phase of the SE algorithm. …”
Get full text
article