Search alternatives:
select detection » detect detecting (Expand Search)
method algorithm » mould algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
source code » source model (Expand Search)
element » elements (Expand Search)
select detection » detect detecting (Expand Search)
method algorithm » mould algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
source code » source model (Expand Search)
element » elements (Expand Search)
-
1
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
Published 2020Subjects: -
2
-
3
-
4
-
5
-
6
A reduced model for phase-change problems with radiation using simplified PN approximations
Published 2025“…The integro-differential equation for the full radiative transfer is replaced by a set of differential equations which are independent of the angle variable and easy to solve using conventional computational methods. To solve the coupled equations, we implement a second-order implicit scheme for the time integration and a mixed finite element method for the space discretization. …”
Get full text
article -
7
Extended Behavioral Modeling of FET and Lattice-Mismatched HEMT Devices
Published 2016Subjects: Get full text
doctoralThesis -
8
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
9
Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study
Published 2021“…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …”
Get full text
article -
10
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Published 2022“…Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. …”
-
11
The Use of Microwave Tomography in Bone Healing Monitoring
Published 2019Get full text
doctoralThesis -
12
-
13
-
14
-
15
Design of adaptive arrays based on element position perturbations
Published 1993“…The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …”
Get full text
Get full text
article -
16
A machine learning model for early detection of diabetic foot using thermogram images
Published 2021“…Several studies have reported that thermogram images may help to detect an increase in plantar temperature prior to DFU. …”
-
17
LNCRI: Long Non-Coding RNA Identifier in Multiple Species
Published 2021“…The benchmark datasets and source code are available in GitHub: http://github.com/smusleh/LNCRI.…”
-
18
Interval-Valued SVM Based ABO for Fault Detection and Diagnosis of Wind Energy Conversion Systems
Published 2022“…Then, to improve even more the performances of the developed interval-valued SVM, multiscale data representation will be used to develop multiscale extensions of interval-valued SVM. Next, as a feature selection tool, an improved extension of Artificial Butterfly Optimization (ABO) algorithm is used in order to extract the significant features from data and improve the diagnosis results of multiscale interval SVM. …”
-
19
-
20
An Intensive and Comprehensive Overview of JAYA Algorithm, its Versions and Applications
Published 2021“…Furthermore, the open sources code of JAYA algorithm are identified to provide enrich resources for JAYA research communities. …”
Get full text