بدائل البحث:
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
implement » implemented (توسيع البحث), implementing (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
implement » implemented (توسيع البحث), implementing (توسيع البحث)
-
141
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
منشور في 2024"…Based on the performance metrics, such as confusion matrix, training time, prediction time, accuracy, and Area Under the Receiver Operating Characteristic curve (AUC-ROC), it was established that SDN-ML-IoT, when applied to RF, outperforms other ML algorithms, as well as similar approaches related to our work. …"
-
142
-
143
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
منشور في 2024"…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …"
-
144
A Clinically Interpretable Approach for Early Detection of Autism Using Machine Learning With Explainable AI
منشور في 2025"…After handling missing values, balancing the dataset, and analyzing the classifier’s performance, it is found that tree-based algorithms, particularly RF, perform better for all the datasets. …"
-
145
Timing influenced general-cell genetic floorplanner
منشور في 2020"…The first phase is implemented using genetic algorithm while in the second phase we adopt a constraint graph based approach. …"
احصل على النص الكامل
احصل على النص الكامل
article -
146
Timing influenced general-cell genetic floorplanner
منشور في 2020"…The floorplanner works in two phases. In the first phase we use the genetic algorithm and restrict the modules to be rigid and the floorplan to have slicing structure. …"
احصل على النص الكامل
article -
147
Regression testing C# programs. (c2007)
منشور في 2007احصل على النص الكامل
احصل على النص الكامل
masterThesis -
148
Three approaches to modelling heating and evaporation of monocomponent droplets
منشور في 2024"…In the third approach, the same algorithm as in the second approach is used to calculate the heat rate but the mass evaporation rate in this approach is inferred from the coupled solution to the momentum, mass and energy conservation equations in the gas phase; the gas mixture density in this approach depends on temperature. …"
-
149
Information warfare. (c2015)
منشور في 2015"…In addition, we will implement the algorithm and compare its performance to other detection and recovery algorithms.…"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
150
A novel hybrid methodology for fault diagnosis of wind energy conversion systems
منشور في 2023"…Therefore, a hybrid feature selection based diagnosis technique, that can preserve the advantages of wrapper and filter algorithms as well as RF model, is proposed. In the first phase, the neighborhood component analysis (NCA) filter algorithm is used to reduce and select only the pertinent features from the original raw data. …"
-
151
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
152
Turbo-charging dominating set with an FPT subroutine
منشور في 2017"…Turbo-charging is a recent algorithmic technique that is based on the fixed-parameter tractability of the dynamic versions of some problems as a way to improve heuristics. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
153
Assigning proctors to exams using scatter search. (c2006)
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
masterThesis -
154
A Neuro-Heuristic Approach for Segmenting Handwritten Arabic Text
منشور في 2001"…The algorithm then generates pre-segmentation points for these blocks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
155
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …"
-
156
Complexity Avoidance using Biological Resemblance of Modular Multivariable Structure
منشور في 2014"…Combination of Fuzzy logic and Genetic Algorithm is becoming popular among researchers in the field. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
157
A neuro-heuristic approach for segmenting handwritten Arabic text. (c2001)
منشور في 2001احصل على النص الكامل
احصل على النص الكامل
masterThesis -
158
Face Recognition in Uncontrolled Indoor Environment
منشور في 2013احصل على النص الكامل
doctoralThesis -
159
Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring
منشور في 2020"…However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. …"
-
160
A pragmatic approach for testing robustness on real-time component based systems
منشور في 2005"…If all components are robust according to the inserted hazards, in the second phase, we use the nominal and degraded specification of the whole system to check the robustness of communications between components.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject