咨询与建议

限定检索结果

文献类型

  • 7 篇 期刊文献
  • 7 篇 会议
  • 1 册 图书

馆藏范围

  • 15 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13 篇 工学
    • 9 篇 计算机科学与技术...
    • 3 篇 电气工程
    • 2 篇 仪器科学与技术
    • 2 篇 控制科学与工程
    • 1 篇 机械工程
    • 1 篇 信息与通信工程
    • 1 篇 食品科学与工程(可...
    • 1 篇 软件工程
  • 2 篇 理学
    • 1 篇 生物学
    • 1 篇 系统科学
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...

主题

  • 15 篇 multiple algorit...
  • 3 篇 personalised enc...
  • 3 篇 evolutionary com...
  • 3 篇 coding and encry...
  • 2 篇 naked mole rat a...
  • 2 篇 comparison of cl...
  • 2 篇 multiple data se...
  • 2 篇 numerical optimi...
  • 2 篇 bradley-terry mo...
  • 2 篇 artificial intel...
  • 2 篇 artificial neura...
  • 2 篇 comparison of re...
  • 2 篇 bayesian
  • 1 篇 zeus
  • 1 篇 image fusion
  • 1 篇 intrusion detect...
  • 1 篇 adaptive propert...
  • 1 篇 programming lang...
  • 1 篇 noise sources
  • 1 篇 reliability

机构

  • 3 篇 middle east univ...
  • 2 篇 agh univ sci & t...
  • 1 篇 king saud univ c...
  • 1 篇 shri vishwakarma...
  • 1 篇 nation engn lab ...
  • 1 篇 school of electr...
  • 1 篇 suzhou polytech ...
  • 1 篇 school of mathem...
  • 1 篇 univ technol syd...
  • 1 篇 school of electr...
  • 1 篇 hainan univ coll...
  • 1 篇 vellore inst tec...
  • 1 篇 artificial intel...
  • 1 篇 univ maryland ba...
  • 1 篇 mit csail cambri...
  • 1 篇 univ innsbruck i...
  • 1 篇 agh univ krakow ...
  • 1 篇 punjab engn coll...
  • 1 篇 univ estadual ca...
  • 1 篇 obuda univ univ ...

作者

  • 3 篇 salgotra rohit
  • 1 篇 raju saravanakum...
  • 1 篇 bezobrazov serge...
  • 1 篇 jonathan blackle...
  • 1 篇 wainer jacques
  • 1 篇 stonebraker mike
  • 1 篇 mohamed ali wagd...
  • 1 篇 sharma pankaj
  • 1 篇 sergei bezobrazo...
  • 1 篇 p. tobin
  • 1 篇 talwar dhruv
  • 1 篇 almazyad abdulaz...
  • 1 篇 cui baojiang
  • 1 篇 jin haifeng
  • 1 篇 shen chong
  • 1 篇 gulati dhairya
  • 1 篇 jindal alekh
  • 1 篇 dressler falko
  • 1 篇 sommer christoph
  • 1 篇 zhang xiaorui

语言

  • 14 篇 英文
  • 1 篇 中文
检索条件"主题词=multiple algorithms"
15 条 记 录,以下是1-10 订阅
排序:
Analysis of the NLOS channel environment of TDOA multiple algorithms  14
Analysis of the NLOS channel environment of TDOA multiple al...
收藏 引用
2015 IEEE SENSORS
作者: Zhang, Jie Dong, Fang Feng, Gaoang Shen, Chong Hainan Univ Coll Informat Sci & Technol Haikou Peoples R China
With the development of wireless communication technology and the improvement of data processing capability, as a new value-added service, location service has a broad market prospect, its basic principle is using the... 详细信息
来源: 评论
Exploring multiple algorithms for leaf classification:A comparative study
Exploring multiple algorithms for leaf classification:A comp...
收藏 引用
作者: Haoyang Pan School of Mechano-Electronic Engineering Xidian University
In the world there are an estimated nearly half a million plant species,and the leaves of each plant have their own unique ***,leaf classification has historically been problematic,with some similar-looking leaves bei... 详细信息
来源: 评论
A Bayesian Bradley-Terry model to compare multiple ML algorithms on multiple data sets
收藏 引用
JOURNAL OF MACHINE LEARNING RESEARCH 2023年 24卷
作者: Wainer, Jacques Univ Estadual Campinas Inst Comp Artificial Intelligence Lab RECOD AI BR-13083970 Campinas Brazil
This paper presents a Bayesian model, called the Bayesian Bradley Terry (BBT) model, for comparing multiple algorithms on multiple data sets based on any metric. The model is an extension of the Bradley Terry model, w... 详细信息
来源: 评论
A Bayesian Bradley-Terry model to compare multiple ML algorithms on multiple data sets
The Journal of Machine Learning Research
收藏 引用
The Journal of Machine Learning Research 2023年 第1期24卷 16307-16340页
作者: Jacques Wainer Artificial Intelligence Lab RECOD.ai Institute of Computing University of Campinas Campinas Brazil
This paper presents a Bayesian model, called the Bayesian Bradley Terry (BBT) model, for comparing multiple algorithms on multiple data sets based on any metric. The model is an extension of the Bradley Terry model, w... 详细信息
来源: 评论
VERTEXICA: Your Relational Friend for Graph Analytics!
收藏 引用
PROCEEDINGS OF THE VLDB ENDOWMENT 2014年 第13期7卷 1669-1672页
作者: Jindal, Alekh Rawlani, Praynaa Wu, Eugene Madden, Samuel Deshpande, Amol Stonebraker, Mike MIT CSAIL Cambridge MA 02139 USA Univ Maryland Baltimore MD 21201 USA
In this paper, we present VERTEXICA, a graph analytics tools on top of a relational database, which is user friendly and yet highly efficient. Instead of constraining programmers to SQL, VERTEXICA offers a popular ver... 详细信息
来源: 评论
Multi-Layer Anomaly Detection for Internet Traffic Based on Data Mining  9
Multi-Layer Anomaly Detection for Internet Traffic Based on ...
收藏 引用
9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
作者: Cui, Baojiang He, Shanshan Jin, Haifeng Beijing Univ Posts & Telecommun Sch Comp Sci Beijing Peoples R China Nation Engn Lab Mobile Network Secur Beijing Peoples R China
the large number of internet traffic has highlighted the importance of traffic detection. Anomaly detection is playing an increasingly important role in network security. Feature matching, statistics rules and data mi... 详细信息
来源: 评论
Cryptography using Artificial Intelligence
Cryptography using Artificial Intelligence
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Blackledge, Jonathan Bezobrazov, Sergei Tobin, Paul Univ KwaZulu Natal Sch Math Stat & Comp Sci Durban South Africa Brest State Tech Univ Intelligent Informat Technol Dept Brest BELARUS Dublin Inst Technol Sch Elect & Elect Engn Dublin Ireland
This paper presents and discusses a method of generating encryption algorithms using neural networks and evolutionary computing. Based on the application of natural noise sources obtained from data that can include at... 详细信息
来源: 评论
Adaptive Load Allocation for Combining Anomaly Detectors Using Controlled Skips
Adaptive Load Allocation for Combining Anomaly Detectors Usi...
收藏 引用
International Conference on Computing, Networking and Communications (ICNC)
作者: Berger, Mario Erlacher, Felix Sommer, Christoph Dressler, Falko Barracuda Networks Innsbruck Austria Univ Innsbruck Inst Comp Sci Comp & Commun Syst A-6020 Innsbruck Austria
Traditional Intrusion Detection Systems (IDS) can be complemented by an Anomaly Detection Algorithm (ADA) to also identify unknown attacks. We argue that, as each ADA has its own strengths and weaknesses, it might be ... 详细信息
来源: 评论
Dec :: Tech Reports :: Src-RR-98
收藏 引用
2016年
Dec :: Tech Reports :: Src-RR-98 by published by
来源: 评论
RGN: A Triple Hybrid Algorithm for Multi-level Image Segmentation with Type II Fuzzy Sets
收藏 引用
AIN SHAMS ENGINEERING JOURNAL 2024年 第11期15卷
作者: Salgotra, Rohit Mittal, Nitin Almazyad, Abdulaziz S. Mohamed, Ali Wagdy AGH Univ Krakow Fac Phys & Appl Comp Sci Krakow Poland Univ Technol Sydney Data Sci Inst 15 Broadway Ultimo NSW 2007 Australia Middle East Univ MEU Res Unit Amman Jordan Shri Vishwakarma Skill Univ Skill Fac Engn & Technol Palwal 121102 Haryana India King Saud Univ Coll Comp & Informat Sci Dept Comp Engn POB 51178 Riyadh 11543 Saudi Arabia Cairo Univ Fac Grad Studies Stat Res Operat Res Dept Giza 12613 Egypt
This paper presents a study focused on enhancing the effectiveness of cuckoo search (CS). The goal is to improve its performance in avoiding local optima, improve the exploration and exploit potentially new solutions.... 详细信息
来源: 评论