Search alternatives:
using algorithm » cosine algorithm (Expand Search)
cc3d algorithm » rd algorithm (Expand Search)
level using » level fusion (Expand Search)
using algorithm » cosine algorithm (Expand Search)
cc3d algorithm » rd algorithm (Expand Search)
level using » level fusion (Expand Search)
-
141
A geometric-primitives-based compression scheme for testingsystems-on-a-chip
Published 2001“…The increasing complexity of systems-on-a-chip with the accompanied increase in their test data size has made the need for test data reduction imperative. …”
Get full text
Get full text
article -
142
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
Published 2015“…First, our approach resolves the complexity of policies by elaborating an intermediate set-based representation to which the elements of XACML are automatically converted. …”
Get full text
Get full text
Get full text
article -
143
A method for data path synthesis using neural networks
Published 2017“…The proposed algorithm has a running time complexity of O(1) for a neural network with n vertices and c cliques. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
144
An Efficient Prediction System for Diabetes Disease Based on Deep Neural Network
Published 2021“…Such algorithms are state‐of‐the‐art in computer vision, language processing, and image analysis, and when applied in healthcare for prediction and diagnosis purposes, these algorithms can produce highly accurate results. …”
-
145
A Survey of Data Clustering Techniques
Published 2023“…This survey examines seven widely recognized clustering techniques, namely k-means, G-means, DBSCAN, Agglomerative hierarchical clustering, Two-stage density (DBSCAN and k-means) algorithm, Two-levels (DBSCAN and hierarchical) clustering algorithm, and Two-stage MeanShift and K-means clustering algorithm and compares them over a real dataset - The Blockchain dataset, including prominent cryptocurrencies like Binance, Bitcoin, Doge, and Ethereum, under several metrics such as silhouette coefficient, Calinski-Harabasz, Davies-Bouldin Index, time complexity, and entropy.…”
Get full text
Get full text
Get full text
masterThesis -
146
Cyberbullying Detection in Arabic Text using Deep Learning
Published 2023“…First, the comments were classified as (positive/negative/neutral), and then the negative comments were further classified into two categories based on their level of negativity (toxic, bullying). …”
Get full text
-
147
Efficient Seismic Volume Compression using the Lifting Scheme
Published 2000“…A separable 3-D discrete wavelet transform (DWT) using long biorthogonal filters is used. The computation efficiency of the DWT is improved by factoring the wavelet filters using the lifting scheme. …”
Get full text
article -
148
A heuristics for HTTP traffic identification in measuring user dissimilarity
Published 2020“…This study reveals that, with the current complex nature of Internet and HTTP traffic, browser complexity, dynamic web programming structure, the surge in network delay, and unstable user behavior in network interaction, user-initiated requests can be accurately determined. …”
-
149
-
150
A Geometric-Primitives-Based Compression Scheme for Testing Systems-on-a-Chip
Published 2001“…The increasing complexity of systems-on-a-chip with the accompanied increase in their test data size has made the need for test data reduction imperative. …”
Get full text
article -
151
Resources Allocation for Drones Tracking Utilizing Agent-Based Proximity Policy Optimization
Published 2023“…This paper presents a reinforcement learning agent-based model that works by incorporating the MESA environment with the Stone Soup radar systems simulator. …”
Get full text
-
152
-
153
On-demand deployment of multiple aerial base stations for traffic offloading and network recovery
Published 2019“…We present performance results for the proposed algorithm as a function of various system parameters and demonstrate its effectiveness compared to the close-to-optimal greedy approach and its superiority compared to recent related work from the literature.…”
Get full text
Get full text
Get full text
Get full text
article -
154
Modulation With Metaheuristic Approach for Cascaded-MPUC49 Asymmetrical Inverter With Boosted Output
Published 2020“…For the calculation of optimum angles, a meta-heuristic based Genetic Algorithm (GA) technique is employed. The generation of 49-level output requires 24 transitions in one quarter of a cycle. …”
-
155
-
156
-
157
FPGA-Based Network Traffic Classification Using Machine Learning
Published 2020“…Classification approaches based on machine learning techniques have shown promising results with high levels of accuracy. In this paper, the suitability of packet-level and flow-level features is validated using stepwise regression and random forest feature selection. …”
Get full text
article -
158
UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks
Published 2018“…We formulate a joint optimization problem and divide it into four complementary subproblems to generate close-to-optimal results with lower complexity. Moreover, we propose a set of effective algorithms to generate solutions for relatively large-scale network scenarios. …”
Get full text
Get full text
Get full text
Get full text
article -
159
Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials
Published 1997“…The proposed techniques are: i) a batch-type deconvolution method using the complex bicepstrum algorithm, and ii) automatic ultrasonic defect classification system using a modular learning strategy. …”
Get full text
masterThesis -
160
An efficient approach for textual data classification using deep learning
Published 2022“…<p dir="ltr">Text categorization is an effective activity that can be accomplished using a variety of classification algorithms. In machine learning, the classifier is built by learning the features of categories from a set of preset training data. …”