بدائل البحث:
model selection » wheel selection (توسيع البحث)
يعرض 1 - 20 نتائج من 188 نتيجة بحث عن '(( model selection algorithm ) OR ( secure encryption algorithm ))*', وقت الاستعلام: 0.10s تنقيح النتائج
  1. 1
  2. 2
  3. 3
  4. 4

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group حسب Iqtadar Hussain (14147850)

    منشور في 2023
    "…<p dir="ltr">There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. …"
  5. 5

    A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes حسب Temadher Alassiry Al-Maadeed (14147847)

    منشور في 2022
    "…<p>We have proposed a robust, secure and efficient image encryption algorithm based on chaotic maps and algebraic structure. …"
  6. 6

    Machine Learning-Driven Prediction of Corrosion Inhibitor Efficiency: Emerging Algorithms, Challenges, and Future Outlooks حسب Najam Us Sahar Riyaz (22927843)

    منشور في 2025
    "…At the same time, virtual sample augmentation and genetic algorithm feature selection elevate sparse data performance, raising k-nearest neighbor models from R<sup>2</sup> = 0.05 to 0.99 in a representative thiophene set. …"
  7. 7

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment حسب Zakaria Tolba (16904718)

    منشور في 2022
    "…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …"
  8. 8

    Scrambled Prime Key Encryption حسب Haraty, Ramzi A.

    منشور في 2018
    "…Nevertheless, but the fast increase in computers' speed may threaten these algorithms. This paper presents an innovative symmetric encryption, which we call Scrambled Prime Key Encryption or SPKE that tries to heighten the level of communication security. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  9. 9

    UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data حسب Behrouz Ahadzadeh (19757022)

    منشور في 2024
    "…To overcome these challenges, a new FS algorithm named Uniform-solution-driven Binary Feature Selection (UniBFS) has been developed in this study. …"
  10. 10
  11. 11

    Multiclass feature selection with metaheuristic optimization algorithms: a review حسب Abu Zitar, Raed

    منشور في 2022
    "…The feature selection problem aims at reducing the feature set dimension while maintaining the performance model accuracy. …"
    احصل على النص الكامل
  12. 12

    Variable Selection in Data Analysis: A Synthetic Data Toolkit حسب Mitra, Rohan

    منشور في 2024
    "…Variable (feature) selection plays an important role in data analysis and mathematical modeling. …"
    احصل على النص الكامل
    article
  13. 13

    Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms حسب Humna Khan (17541972)

    منشور في 2022
    "…The outcomes revealed that these ML algorithms can be useful in predicting ground losses during wild blueberry harvesting in the selected fields.…"
  14. 14
  15. 15

    Bird’s Eye View feature selection for high-dimensional data حسب Samir Brahim Belhaouari (16855434)

    منشور في 2023
    "…However, high dimensional data often contains irrelevant features, outliers, and noise, which can negatively impact model performance and consume computational resources. …"
  16. 16

    Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique حسب Syeda Tayyaba Bukhari (21842078)

    منشور في 2024
    "…The research aims to use the elliptic-curve cryptography (ECC) encryption algorithm for storing the seed phrase online by encrypting the seed phrase and using the splitting technique to store the crypto wallet seed phrase. …"
  17. 17
  18. 18
  19. 19

    A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer حسب M. Z. Yildiz (16855476)

    منشور في 2019
    "…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …"
  20. 20

    Arabic Text Classification Using Modified Artificial Bee Colony Algorithm for Sentiment Analysis: The Case of Jordanian Dialect حسب Habeeb, Abdallah

    منشور في 2022
    "…The second phase, modified the Artificial Bee Colony (ABC) Algorithm, with Upper Confidence Bound (UCB) Algorithm, to promote the exploitation ability for the minimum dimension, to get the minimum number of the optimal feature, then using forward feature selection strategy by four classifiers of machine learning algorithms: (K-Nearest Neighbors (KNN), Support vector machines (SVM), Naïve-Bayes (NB), and Polynomial Neural Networks (PNN). …"
    احصل على النص الكامل