بدائل البحث:
generation algorithm » genetic algorithm (توسيع البحث)
code encryption » secure encryption (توسيع البحث)
generation algorithm » genetic algorithm (توسيع البحث)
code encryption » secure encryption (توسيع البحث)
-
1
Optimal Management of Mobile Energy Generation and Storage Systems
منشور في 2018احصل على النص الكامل
doctoralThesis -
2
A FeedForward–Convolutional Neural Network to Detect Low-Rate DoS in IoT
منشور في 2022"…The existing AI-based detection algorithms in the literature are signature-based, and their efficacy in detecting unknown LR DoS attacks was not explored. …"
-
3
Socially Motivated Approach to Simulate Negotiation Process
منشور في 2014احصل على النص الكامل
doctoralThesis -
4
IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture
منشور في 2025"…The IoMT manufacturers need to offer their products at a competitive price, which forces them to use simplified architecture, leaving limited and, to some extent, no scope to employ sophisticated cybersecurity algorithms. …"
-
5
Morphology for Planar Hexagonal Modular Self-Reconfigurable Robotic Systems
منشور في 2009احصل على النص الكامل
doctoralThesis -
6
IDENTIFICATION AND CONTROL STRATEGY APPLIED IN LOAD MANAGEMENT OF RESIDENTIAL AIR-CONDITIONERS
منشور في 2004"…These steps involve identifying the parameters of systems and applying the control strategies as forced duty cycles. An integrated simulation environment was developed wherein the identification and control algorithm were implemented. …"
احصل على النص الكامل
masterThesis -
7
CFD Based Airfoil Shape Optimization for Aerodynamic Drag Reduction
منشور في 2012احصل على النص الكامل
doctoralThesis -
8
Hybrid deep learning based threat intelligence framework for Industrial IoT systems
منشور في 2025"…The proposed approach was also compared against several contemporary deep learning-based architectures and existing benchmark algorithms. The results indicate that the proposed method achieves superior detection accuracy, with only a minimal compromise in speed efficiency. …"
-
9
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
منشور في 2022"…Additionally, the proposed approach achieved a 6.43 percent better score in PSNR with a variable measure of code inserted in similar images with distinct dimensions. …"
-
10
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
منشور في 2017"…Model geometries were generated using b-mode echocardiography images of an aortic valve. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
11
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
منشور في 2017"…Model geometries were generated using b-mode echocardiography images of an aortic valve. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article