Search alternatives:
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
using algorithms » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
using algorithms » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
-
641
Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review
Published 2024“…Furthermore, this study also focuses on different Machine learning algorithms that are used to secure wireless sensor networks. …”
-
642
-
643
DeepRaman: Implementing surface-enhanced Raman scattering together with cutting-edge machine learning for the differentiation and classification of bacterial endotoxins
Published 2025“…ConclusionWe present the effectiveness of DeepRaman, an innovative architecture inspired by the Progressive Fourier Transform and integrated with the scalogram transformation method, in classifying raw SERS Raman spectral data from biological specimens with unparalleled accuracy relative to conventional machine learning algorithms. …”
Get full text
Get full text
Get full text
article -
644
Growing hierarchical self-organizing map for filtering intrusion detection alarms
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
645
An EM-Based Forward-Backward Kalman Filter for the Estimation of Time-Variant Channels in OFDM
Published 0000“…The algorithm makes a collective use of the data and channel constraints inherent in the communication problem. …”
Get full text
Get full text
article -
646
Comprehensive whole genome sequence analyses yields novel genetic and structural insights for Intellectual Disability
Published 2017“…The <i>de novo</i> assembly resulted in unmasking hidden genome instability that was missed by standard re-alignment based algorithms. We also interrogated regulatory sequence variation for known and hypothesized ID genes and present useful strategies for WGS data analyses for non-coding variation.…”
-
647
Newton-Raphson based adaptive inverse control scheme for tracking of nonlinear dynamic plants
Published 2006“…The U-model is utilized to design an adaptive inverse controller by using a simple root-solving algorithm of Newton-Raphson. The synergy of U-model with AIC structure has provided an effective and straight forward method for adaptive tracking of nonlinear plants. …”
Get full text
Get full text
article -
648
An Improved Genghis Khan Optimizer based on Enhanced Solution Quality Strategy for Global Optimization and Feature Selection Problems
Published 2024“…The primary goals of feature selection are to decrease the number of dimensions and enhance classification accuracy in many domains, such as text classification, large-scale data analysis, and pattern recognition. Several metaheuristics, such as the Genghis Khan Shark Optimizer Algorithm (GKSO), can assist in optimizing the FS issue. …”
Get full text
-
649
A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem
Published 2008“…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …”
Get full text
Get full text
Get full text
article -
650
-
651
Accelerating Blockchain Transaction Verification With Parallel Computing
Published 2024Get full text
doctoralThesis -
652
Edge Caching in Fog-Based Sensor Networks through Deep Learning-Associated Quantum Computing Framework
Published 2022“…After selecting the most appropriate lattice map (32 × 32) in 750,000 iterations using SOMs, the data points below the dark blue region are mapped onto the data frame to get the videos. …”
-
653
The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions
Published 2022“…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
-
654
Multilayer perceptron-based DFE with lattice structure
Published 2001“…It is shown from computer simulations that whitening the received data employing adaptive lattice channel equalization algorithms improves the convergence rate and bit error rate performances of multilayer perceptron-based DFE. …”
article -
655
Multilayer perceptron-based DFE with lattice structure
Published 2001“…It is shown from computer simulations that whitening the received data employing adaptive lattice channel equalization algorithms improves the convergence rate and bit error rate performances of multilayer perceptron-based DFE. …”
Get full text
Get full text
article -
656
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
Published 2021“…An attacker can easily capture data from the available network channel and use it for their own purpose. …”
-
657
Role of authentication factors in Fin-tech mobile transaction security
Published 2023“…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…”
-
658
Recursive Parameter Identification Of A Class Of Nonlinear Systems From Noisy Measurements
Published 2020“…A model is proposed to identify the parameters of a class of stochastic nonlinearsystems. …”
Get full text
article -
659
Resilience analytics: coverage and robustness in multi-modal transportation networks
Published 2018“…<p>A multi-modal transportation system of a city can be modeled as a multiplex network with different layers corresponding to different transportation modes. …”
-
660
Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles
Published 2000“…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …”
Get full text
Get full text
Get full text
article