Suggested Topics within your search.
Suggested Topics within your search.
- Algorithms 150
- Computer algorithms 141
- Dissertations, Academic 118
- Dissertations 62
- Genetic algorithms 58
- Data structures (Computer science) 53
- Data processing 45
- Computer programming 38
- Machine learning 29
- Mathematical models 27
- Mathematical optimization 26
- Neural networks (Computer science) 24
- Congresses 18
- Artificial intelligence 16
- Mathematics 16
- Data mining 15
- Graph theory 13
- Combinatorial analysis 12
- Combinatorial optimization 12
- Computer science 12
- Java (Computer program language) 12
- Parallel processing (Electronic computers) 12
- C++ (Computer program language) 11
- Computational complexity 11
- Evolutionary programming (Computer science) 11
- Computer graphics 10
- Computer security 10
- Cryptography 10
- Programming (Mathematics) 10
- Operations research 9
-
741
-
742
-
743
A machine learning approach to analysis and classification of measurements in cultural heritage
Published 2020“…Spectral identification and analysis on artists' materials is being done with the aid of already existing spectral databases and spectrum matching algorithms. We demonstrate that with a machine learning method called Extremely Randomised Trees, we can learn a model in a supervised learning fashion, able to accurately match an entire-spectrum range into its respective mineral. …”
Get full text
-
744
Υπολογιστικό σύστημα ταξινόμησης έργων ζωγραφικής με την χρήση τεχνητών νευρωνικών δικτύων
Published 2020“…Our aim was to design a system for the classification of paintings according to artistic style, using machine learning algorithms. From the field of machine learning we focused on artificial neural networks and we explored different network architectures and training techniques, in order to find the most suitable model for our problem. …”
Get full text
-
745
Ανίχνευση κακόβουλου λογισμικού σε περιβάλλον android με τεχνικές data mining
Published 2019“…In this work we use the permissions of safe and malicious applications as a data structure to excavate knowledge so that we can predict if an application from Google Play is safe or malicious using Rapidminer various data mining techniques and algorithms to get the best possible result. We will show the way data was collected and their analysis to arrive at a desired result which we will apply with an android application and a Java server. …”
Get full text
Get full text
-
746
Real time control for wireless networked multi-channel systems with safe switching techniques
Published 2021“…The aim of this thesis is to deploy and develop appropriate algorithms to overcome the problem of wireless remote control that is the presence of varying time delays imposed from wireless network communication between sensors and controller and between controller and actuators. …”
Get full text
-
747
-
748
-
749
-
750
-
751
-
752
-
753
-
754
-
755
-
756
Αρχιτεκτονική και αλγόριθμοι δρομολόγησης στο υπολογιστικό πλέγμα :
Published 2007Get full text
Thesis Book -
757
Συγκριτική μελέτη και αξιολόγηση κρυπτογραφικών βιβλιοθηκών ανοιχτού κώδικα :
Published 2012Get full text
Thesis Book -
758
Information security incidents = Επεισόδια ασφάλειας πληροφοριών :
Published 2016Get full text
Thesis Book -
759
-
760