بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
search » research (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
search » research (توسيع البحث)
-
101
Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation
منشور في 2022"…We describe our differentially-private model with flexible constraints and a dynamic window algorithm to maintain the privacy-budget loss in infinitely generated time-series data. …"
-
102
Evaluation of C-arm CT metal artifact reduction algorithm during intra-aneurysmal coil embolization
منشور في 2016"…This analysis was carried out to assess the improvements in both brain parenchyma and device visibility with MAR algorithm. Further, ground truth reference images from phantom experiments and clinical data were used for accurate assessment. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
103
Modified Elite Opposition-Based Artificial Hummingbird Algorithm for Designing FOPID Controlled Cruise Control System
منشور في 2023"…This study proposes a novel approach for designing a fractional order proportional-integral-derivative (FOPID) controller that utilizes a modified elite opposition-based artificial hummingbird algorithm (m-AHA) for optimal parameter tuning. …"
احصل على النص الكامل
-
104
Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval
منشور في 2024"…<p dir="ltr">Fault detection and diagnosis (FDD) systems play a crucial role in maintaining the adequate execution of the monitored process. One of the widely used data-driven FDD methods is the Principal Component Analysis (PCA). …"
-
105
Indexing Arabic texts using association rule data mining
منشور في 2019"…The model denotes extracting new relevant words by relating those chosen by previous classical methods to new words using data mining rules. Design/methodology/approach The proposed model uses an association rule algorithm for extracting frequent sets containing related items – to extract relationships between words in the texts to be indexed with words from texts that belong to the same category. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
106
-
107
Stochastic Programming for Hub Energy Management Considering Uncertainty Using Two-Point Estimate Method and Optimization Algorithm
منشور في 2023"…The proposed IARO-based scheduling framework’s performance is evaluated against that of traditional ARO, particle swarm optimization (PSO), and salp swarm algorithm (SSA). …"
-
108
Using genetic algorithms to optimize software quality estimation models
منشور في 2004"…In the first approach, we assume the existence of several models, and we use a genetic algorithm to combine them, and adapt them to a given data set. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
109
-
110
An efficient approach for textual data classification using deep learning
منشور في 2022"…<p dir="ltr">Text categorization is an effective activity that can be accomplished using a variety of classification algorithms. In machine learning, the classifier is built by learning the features of categories from a set of preset training data. …"
-
111
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
منشور في 2022"…The method used in this research is a classification of models and algorithms used in data mining. …"
احصل على النص الكامل
-
112
-
113
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
منشور في 2022"…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …"
-
114
-
115
-
116
Data Embedding in HEVC Video by Modifying the Partitioning of Coding Units
منشور في 2019"…The flags pertaining to 16x16 sub CUs are used as a cover for data embedding, where 6 or 4 message bits are embedded per CU. …"
احصل على النص الكامل
article -
117
-
118
-
119
-
120
Enhanced PSO-Based NN for Failures Detection in Uncertain Wind Energy Systems
منشور في 2023"…First, a feature selection tool using PSO Algorithm is developed. Then, in order to maximize the diversity between data samples and improve the effectiveness of using PSO algorithm for feature selection, the Euclidean distance metric is used in order to reduce the data and maximize the diversity between data samples. …"