Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
learning algorithm » learning algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data modeling » data models (Expand Search), spatial modeling (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
learning algorithm » learning algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data modeling » data models (Expand Search), spatial modeling (Expand Search)
-
661
Deepfakes Signatures Detection in the Handcrafted Features Space
Published 2023“…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
Get full text
-
662
Nonlinear Friction Identification of A Linear Voice Coil DC Motor
Published 2015Get full text
doctoralThesis -
663
-
664
Axes-Based Encryption Key
Published 2018“…For this, a need of robust security systems is raised to ensure that our data will be kept safe. This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
665
Deep Neural Networks for Electromagnetic Inverse Scattering Problems in Microwave Imaging
Published 2023Get full text
doctoralThesis -
666
Cooperative Caching Policy in Fog Computing for Connected Vehicles
Published 2023“…Furthermore, the results showed the proposed model's effectiveness compared to traditional algorithms.…”
Get full text
Get full text
Get full text
masterThesis -
667
Privacy Preserving Cancellable Template Generation for Crypto-Biometric Authentication System
Published 2025“…The proposed methodology not only ensures the protection of biometric data in storage but also facilitates secure data retrieval for authentication purposes. …”
-
668
-
669
SemIndex: Semantic-Aware Inverted Index
Published 2017“…We provide here a new approach, called SemIndex, that extends the standard inverted index by constructing a tight coupling inverted index graph that combines two main resources: a general purpose semantic network, and a standard inverted index on a collection of textual data. We also provide an extended query model and related processing algorithms with the help of SemIndex. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
670
Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases
Published 2024“…To guarantee a safe and successful deployment in clinical practice, the use of AI in cardiology must be done with a thorough understanding of the algorithms and their limits. …”
-
671
Decision-level fusion for single-view gait recognition with various carrying and clothing conditions
Published 2017“…Gait samples are fed into the MPCA and MPCALDA algorithms using a novel tensor-based form of the gait images. …”
Get full text
article -
672
Precision nutrition: A systematic literature review
Published 2021“…Therefore, we carried out a Systematic Literature Review (SLR) to provide an overview of where and how machine learning has been used in Precision Nutrition from various aspects, what such machine learning models use as input features, what the availability status of the data used in the literature is, and how the models are evaluated. …”
-
673
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
Published 2023“…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …”
-
674
-
675
Legal and Ethical Considerations of Artificial Intelligence for Residents in Post-Acute and Long-Term Care
Published 2024“…Third, privacy rules concerning data use may undermine developers’ ability to train accurate AI systems, limiting their usefulness in PA-LTC contexts. …”
-
676
Accelerating Blockchain Transaction Verification With Parallel Computing
Published 2024Get full text
doctoralThesis -
677
FoGMatch
Published 2019“…To address this problem, we propose in this paper a multi-criteria intelligent IoT scheduling approach in fog computing environments using matching game theory. Our solution consists of (1) two optimization problems, one for the IoT devices and one for the fog nodes, (2) preference functions for both the IoT and fog layers to help them rank each other on the basis of several criteria such latency and resource utilization, and (3) centralized and distributed intelligent scheduling algorithms that consider the preferences of both the fog and IoT layers to improve the performance of the overall IoT ecosystem. …”
Get full text
Get full text
Get full text
masterThesis -
678
-
679
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
Published 2024“…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …”
-
680
Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study
Published 2023“…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …”