Search alternatives:
developing based » developing a (Expand Search), developing 21st (Expand Search)
data detection » data injection (Expand Search)
rd algorithm » _ algorithms (Expand Search)
elements rd » elements _ (Expand Search)
developing based » developing a (Expand Search), developing 21st (Expand Search)
data detection » data injection (Expand Search)
rd algorithm » _ algorithms (Expand Search)
elements rd » elements _ (Expand Search)
-
61
Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm
Published 2023“…Furthermore, a route management technique is combined with Artificial Intelligence (AI) algorithm to transmit the data to appropriate central servers. …”
-
62
-
63
Real-Time Performance Evaluation of a Genetic Algorithm Based Fuzzy Logic Controller for IPM Motor Drives
Published 2005“…This work presents a novel speed control scheme using a genetic-based fuzzy logic controller (GFLC) for an interior permanent-magnet synchronous motor (IPMSM) drive. …”
Get full text
article -
64
IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture
Published 2025“…The IntruSafe combines FCNN and LSTM to ensure the detection of both malicious text and image data. It detects and simultaneously protects the IoMT network from further intrusion with only a 0.18% service interruption rate. …”
-
65
Deep and transfer learning for building occupancy detection: A review and comparative analysis
Published 2022“…This work investigates occupancy detection methods to develop an efficient system for processing sensor data while providing accurate occupancy information. …”
-
66
Process Targeting Of Multi-Characteristic Product Using Fuzzy Logic And Genetic Algorithm With An Interval Based Taguchi Cost Function
Published 2020“…In this paper, a fuzzy based process targeting model is developed for a product with multi-characteristic. …”
Get full text
article -
67
Process Targeting Of Multi-Characteristic Product Using Fuzzy Logic And Genetic Algorithm With An Interval Based Taguchi Cost Function
Published 2020“…In this paper, a fuzzy based process targeting model is developed for a product with multi-characteristic. …”
Get full text
article -
68
Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval
Published 2024“…The proposed algorithm has successfully maintained homogeneity to the original data set, reduced the execution time and occupied storage space, and led to decent monitoring performance.…”
-
69
High-Accurate Parameter Identification of PEMFC Using Advanced Multi-Trial Vector-Based Sine Cosine Meta-Heuristic Algorithm
Published 2025“…The trigonometric function-based sine cosine algorithm (SCA) may solve such problems, but it traps in local optima, making it inappropriate for larger optimization tasks. …”
-
70
An Artificial Neural Network for Online Tuning of Genetic Algorithm Based PI Controller for Interior Permanent Magnet Synchronous Motor–Drive
Published 2006“…An artificial neural network (ANN) for online tuning of a genetic algorithm based PI controller for interior permanent magnet synchronous motor (IPMSM) drive is presented in this paper. …”
Get full text
article -
71
Sensitivity analysis and genetic algorithm-based shear capacity model for basalt FRC one-way slabs reinforced with BFRP bars
Published 2023“…Finally, a design equation that can predict the shear capacity of one-way BFRC-BFRP slabs was proposed based on genetic algorithm. The proposed model showed the best prediction accuracy compared to the available design codes and guidelines with a mean of predicted to experimental shear capacities (V<sub>pred</sub>/V<sub>exp</sub>) ratio of 0.97 and a coefficient of variation of 17.91%.…”
-
72
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…Then, the DRF optimization algorithm is applied to optimally tune the features required for accurate intrusion detection and classification. …”
-
73
A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems
Published 2025“…Given that Android applications are frequent targets for malware, ensuring the integrity of FL-based malware detection systems is critical. We introduce an attack framework that integrates Genetic Algorithms (GA) with two prominent adversarial techniques, namely, the Fast Gradient Sign Method (FGSM) and Projected Gradient Descent (PGD), specifically designed for FL environments. …”
-
74
-
75
Data Redundancy Management in Connected Environments
Published 2020“…We describe its modules, and clustering-based algorithms. Moreover, our proposal detects temporal, and spatial-temporal redundancies in order to consider both static and mobile devices/sensors. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
76
-
77
-
78
Automatic and Intelligent Stressor Identification Based on Photoplethysmography Analysis
Published 2021“…In particular, this study proposes a novel algorithm that first detects instances of stress and then classifies the stressor type using photoplethysmography (PPG) data from wearable smartwatches. …”
-
79
Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn...
Published 2020“…A special consideration was given to data pre-processing and dimensionality reduction such Chi Squared (CS) and Recursive Feature Elimination (RFE) to improve progressively the proposed models performance. …”
Get full text
-
80
Parallel Algorithm for Hardware Implementation of Inverse Halftoning
Published 2005“…The algorithm is based on Lookup Tables from which the inverse halftone value of a pixel is directly determined using a pattern of pixels. …”
Get full text
article