بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
search » research (توسيع البحث)
يعرض 101 - 120 نتائج من 1,013 نتيجة بحث عن '(( elements search algorithm ) OR ((( data using algorithm ) OR ( based method algorithm ))))', وقت الاستعلام: 0.17s تنقيح النتائج
  1. 101

    Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation حسب Fawaz Kserawi (16904859)

    منشور في 2022
    "…We describe our differentially-private model with flexible constraints and a dynamic window algorithm to maintain the privacy-budget loss in infinitely generated time-series data. …"
  2. 102

    Evaluation of C-arm CT metal artifact reduction algorithm during intra-aneurysmal coil embolization حسب Chintalapani, Gouthami

    منشور في 2016
    "…This analysis was carried out to assess the improvements in both brain parenchyma and device visibility with MAR algorithm. Further, ground truth reference images from phantom experiments and clinical data were used for accurate assessment. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 103

    Modified Elite Opposition-Based Artificial Hummingbird Algorithm for Designing FOPID Controlled Cruise Control System حسب Abualigah, Laith

    منشور في 2023
    "…This study proposes a novel approach for designing a fractional order proportional-integral-derivative (FOPID) controller that utilizes a modified elite opposition-based artificial hummingbird algorithm (m-AHA) for optimal parameter tuning. …"
    احصل على النص الكامل
  4. 104

    Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval حسب Mohammed Tahar Habib Kaib (21633176)

    منشور في 2024
    "…<p dir="ltr">Fault detection and diagnosis (FDD) systems play a crucial role in maintaining the adequate execution of the monitored process. One of the widely used data-driven FDD methods is the Principal Component Analysis (PCA). …"
  5. 105

    Indexing Arabic texts using association rule data mining حسب Haraty, Ramzi A.

    منشور في 2019
    "…The model denotes extracting new relevant words by relating those chosen by previous classical methods to new words using data mining rules. Design/methodology/approach The proposed model uses an association rule algorithm for extracting frequent sets containing related items – to extract relationships between words in the texts to be indexed with words from texts that belong to the same category. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 106
  7. 107

    Stochastic Programming for Hub Energy Management Considering Uncertainty Using Two-Point Estimate Method and Optimization Algorithm حسب Ali S. Alghamdi (17541711)

    منشور في 2023
    "…The proposed IARO-based scheduling framework’s performance is evaluated against that of traditional ARO, particle swarm optimization (PSO), and salp swarm algorithm (SSA). …"
  8. 108

    Using genetic algorithms to optimize software quality estimation models حسب Azar, Danielle

    منشور في 2004
    "…In the first approach, we assume the existence of several models, and we use a genetic algorithm to combine them, and adapt them to a given data set. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  9. 109
  10. 110

    An efficient approach for textual data classification using deep learning حسب Abdullah Alqahtani (7128143)

    منشور في 2022
    "…<p dir="ltr">Text categorization is an effective activity that can be accomplished using a variety of classification algorithms. In machine learning, the classifier is built by learning the features of categories from a set of preset training data. …"
  11. 111

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector حسب AL HAMMADI, SUMAYYA ABDULLA

    منشور في 2022
    "…The method used in this research is a classification of models and algorithms used in data mining. …"
    احصل على النص الكامل
  12. 112
  13. 113

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment حسب Zakaria Tolba (16904718)

    منشور في 2022
    "…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …"
  14. 114
  15. 115
  16. 116

    Data Embedding in HEVC Video by Modifying the Partitioning of Coding Units حسب Shanableh, Tamer

    منشور في 2019
    "…The flags pertaining to 16x16 sub CUs are used as a cover for data embedding, where 6 or 4 message bits are embedded per CU. …"
    احصل على النص الكامل
    article
  17. 117
  18. 118
  19. 119
  20. 120

    Enhanced PSO-Based NN for Failures Detection in Uncertain Wind Energy Systems حسب Khaled Dhibi (16891524)

    منشور في 2023
    "…First, a feature selection tool using PSO Algorithm is developed. Then, in order to maximize the diversity between data samples and improve the effectiveness of using PSO algorithm for feature selection, the Euclidean distance metric is used in order to reduce the data and maximize the diversity between data samples. …"