Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
defined » designed (Expand Search)
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
defined » designed (Expand Search)
-
361
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
362
A Framework for Predictive Modeling in Sustainable Projects
Published 2012Get full text
doctoralThesis -
363
Nonlinear Friction Identification of A Linear Voice Coil DC Motor
Published 2015Get full text
doctoralThesis -
364
A family of minimum curvature variable-methods for unconstrained optimization. (c1998)
Published 1998Get full text
Get full text
masterThesis -
365
What are artificial intelligence literacy and competency? A comprehensive framework to support them
Published 2024“…We also identify five effective learning experiences to foster abilities and confidences, and suggest five future research directions: prompt engineering, data literacy, algorithmic literacy, self-reflective mindset, and empirical research.…”
Get full text
Get full text
Get full text
article -
366
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
Published 2023“…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …”
-
367
Network-based identification of key master regulators associated with an immune-silent cancer phenotype
Published 2021“…However, in some cancers, such an intratumoral immune activation does not confer protection from progression or relapse. Defining mechanisms associated with immune evasion is imperative to refine stratification algorithms, to guide treatment decisions and to identify candidates for immune-targeted therapy. …”