بدائل البحث:
difference » differences (توسيع البحث)
يعرض 341 - 360 نتائج من 387 نتيجة بحث عن '(difference OR different) based algorithm', وقت الاستعلام: 0.07s تنقيح النتائج
  1. 341

    Tuning of a fuzzy logic power system stabilizer using geneticalgorithms حسب Abido, M.A.

    منشور في 1997
    "…It is shown that the performance of FLPSS can be improved significantly by incorporating a genetic based learning mechanism. The performance of the proposed HPSS under different disturbances and loading conditions is investigated. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 342

    Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis حسب Hassan, Ali

    منشور في 2023
    "…Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 343
  4. 344

    Con-Detect: Detecting Adversarially Perturbed Natural Language Inputs to Deep Classifiers Through Holistic Analysis حسب Hassan Ali (3348749)

    منشور في 2023
    "…<p>Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing (NLP) tasks such as language-to-language translation, spam filtering, fake-news detection, and comprehension understanding. …"
  5. 345
  6. 346

    Automated liver tissues delineation techniques: A systematic survey on machine learning current trends and future orientations حسب Ayman Al-Kababji (16870080)

    منشور في 2023
    "…Hence, in this paper, we survey the key studies that are published between 2014 and 2022, showcasing the different machine learning algorithms researchers have used to segment the liver, hepatic tumors, and hepatic-vasculature structures. …"
  7. 347

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
  8. 348

    Using artificial bee colony to optimize software quality estimation models. (c2015) حسب Abou Assi, Tatiana Antoine

    منشور في 2016
    "…Results show that, in most cases, our proposed technique out-performs the others in different aspects.…"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  9. 349
  10. 350

    Decision-level fusion for single-view gait recognition with various carrying and clothing conditions حسب Al-Tayyan, Amer

    منشور في 2017
    "…Gait samples are fed into the MPCA and MPCALDA algorithms using a novel tensor-based form of the gait images. …"
    احصل على النص الكامل
    article
  11. 351

    The role of Reinforcement Learning in software testing حسب Amr Abo-eleneen (17032284)

    منشور في 2023
    "…</p><h3>Results</h3><p dir="ltr">This study highlights different software testing types to which RL has been applied, commonly used RL algorithms and architecture for learning, challenges faced, advantages and disadvantages of using RL, and the performance comparison of RL-based models against other techniques.…"
  12. 352
  13. 353

    Common weaving approach in mainstream languages for software security hardening حسب Alhadidi, Dima

    منشور في 2013
    "…We handle the correctness and the completeness of GIMPLE weaving in two different ways. In the first approach, we prove them according to the rules and algorithms provided in this paper. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 354
  15. 355

    The Effects of Data Mining on Small Businesses in Dubai حسب AlMutawa, Rasha

    منشور في 2011
    "…The benefits of using data mining on such businesses was confirmed, a different criteria from the traditional kind for evaluating the available tools was used, and an existing cross industry standard for implementing data mining projects (CRISP-DM) was used to evaluate five selected tools for the business based on availability of models, price, platform, and popularity. …"
    احصل على النص الكامل
  16. 356
  17. 357

    Comparative assessment of fracture risk among osteoporosis and osteopenia patients: a cross-sectional study حسب Snezana Tomasevic-Todorovic (5782682)

    منشور في 2018
    "…The assessment of the fracture risk was executed by applying the Fracture Assessment Risk (FRAX) index (an algorithm developed by the World Health Organization) based on clinical fracture risks or combination of clinical fracture risks and bone mineral density.…"
  18. 358

    The Role of Machine Learning in Diagnosing Bipolar Disorder: Scoping Review حسب Zainab Jan (17306614)

    منشور في 2021
    "…The most commonly used data belonged to the clinical category (19, 58%). We identified different machine learning models used in the selected studies, including classification models (18, 55%), regression models (5, 16%), model-based clustering methods (2, 6%), natural language processing (1, 3%), clustering algorithms (1, 3%), and deep learning–based models (3, 9%). …"
  19. 359

    Random Forest Bagging and X‐Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data حسب Rajesh Kumar Dhanaraj (19646269)

    منشور في 2021
    "…Experiments are conducted to evaluate the performance of the RFBXSQLQC technique using the IIT Bombay dataset using the metrics like antipattern detection accuracy, time complexity, false-positive rate, and computational overhead with respect to the differing number of queries. The results revealed that the RFBXSQLQC technique outperforms the existing algorithms by 19% with pattern detection accuracy, 34% minimized time complexity, 64% false-positive rate, and 31% in terms of computational overhead.…"
  20. 360