Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithms » cosine algorithm (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
elemental » elementary (Expand Search), elements (Expand Search), element (Expand Search)
processing algorithm » processing algorithms (Expand Search)
using algorithms » cosine algorithm (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
elemental » elementary (Expand Search), elements (Expand Search), element (Expand Search)
-
201
An enhanced quorum selection algorithm
Published 2009Get full text
Get full text
Get full text
article -
202
An Improved Quorum Selection Algorithm
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
203
Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques
Published 2020“…The obtained results illustrate the efficacy of the proposed algorithm to analyze the time series data from the IoT devices for spam detection.…”
-
204
-
205
Severity-Based Prioritized Processing of Packets with Application in VANETs
Published 2019“…In this study, we propose a generic prioritization and resource management algorithm that can be used to prioritize processing of received packets in vehicular networks. …”
-
206
The use of multi-task learning in cybersecurity applications: a systematic literature review
Published 2024“…Five critical applications, such as network intrusion detection and malware detection, were identified, and several tasks used in these applications were observed. Most of the studies used supervised learning algorithms, and there were very limited studies that focused on other types of machine learning. …”
-
207
Automatic and Intelligent Stressor Identification Based on Photoplethysmography Analysis
Published 2021“…In particular, this study proposes a novel algorithm that first detects instances of stress and then classifies the stressor type using photoplethysmography (PPG) data from wearable smartwatches. …”
-
208
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
Published 2023“…<p dir="ltr">The process of using robotic technology to examine underwater systems is still a difficult undertaking because the majority of automated activities lack network connectivity. …”
-
209
A hybrid heuristic approach to optimize rule based software quality estimation models. (c2008)
Published 2008Get full text
Get full text
masterThesis -
210
A Novel Big Data Classification Technique for Healthcare Application Using Support Vector Machine, Random Forest and J48
Published 2022“…The performance of the algorithms for accuracy was evaluated using the Healthcare (heart attack possibility) dataset, freely available on kagle. …”
Get full text
-
211
Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT
Published 2021“…This paper proposes an Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT. …”
-
212
Optimization of Commercially Off the Shelf (COTS) Electric Propulsion System for Low Speed Fuel Cell UAV
Published 2013Get full text
doctoralThesis -
213
QU-GM: An IoT Based Glucose Monitoring System From Photoplethysmography, Blood Pressure, and Demographic Data Using Machine Learning
Published 2024“…We collected PPG signals, demographic information, and blood pressure data from 139 diabetic (49.65%) and non-diabetic (50.35%) subjects. …”
-
214
Calibration of building model based on indoor temperature for overheating assessment using genetic algorithm: Methodology, evaluation criteria, and case study
Published 2022“…It was found that the calibrated model achieved these metrics with RMSE of 0.3 ◦C, and MAD of 0.8 ◦C, and 85% of data points with an error less than 0.5 ◦C for a school building case.…”
Get full text
Get full text
Get full text
-
215
Defining quantitative rules for identifying influential researchers: Insights from mathematics domain
Published 2024“…The rules were developed for each parameter category using the Decision Tree Algorithm, which achieved an average accuracy of 70 to 75 percent for identifying awardees in mathematics domains. …”
-
216
Fast Transient Stability Assessment of Power Systems Using Optimized Temporal Convolutional Networks
Published 2024“…The proposed algorithm unlocks scalability and system adaptability to operational variability by adopting numeric imputation and missing-data-tolerant techniques. …”
-
217
An App for Navigating Patient Transportation and Acute Stroke Care in Northwestern Ontario Using Machine Learning: Retrospective Study
Published 2024“…</p><h3>Methods</h3><p dir="ltr">Using historical data (2008-2020), an accurate prediction model using machine learning methods was developed and incorporated into a mobile app. …”
-
218
A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems
Published 2025“…<p dir="ltr">Federated Learning (FL) is gaining traction in Android-based consumer electronics, enabling collaborative model training across decentralized devices while preserving data privacy. However, the increasing adoption of FL in these devices exposes them to adversarial attacks that can compromise user data and device security. …”
-
219
Stochastic Search Algorithms for Exam Scheduling
Published 2007“…Then, we empirically compare the three proposed algorithms and FESP using realistic data. Our experimental results show that SA and GA produce good exam schedules that are better than those of FESP heuristic procedure. …”
Get full text
Get full text
article -
220
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
Get full text