Search alternatives:
research algorithm » search algorithm (Expand Search)
developing based » developing a (Expand Search), developing 21st (Expand Search)
using algorithm » cosine algorithm (Expand Search)
research algorithm » search algorithm (Expand Search)
developing based » developing a (Expand Search), developing 21st (Expand Search)
using algorithm » cosine algorithm (Expand Search)
-
421
A heuristics for HTTP traffic identification in measuring user dissimilarity
Published 2020“…The study utilizes HTTP request method of GET filtering, to develop a heuristic algorithm to identify user-initiated requests. …”
-
422
Autopilot Design and Commercial Autopilot Evaluation Using Flybarless Helicopter
Published 2014Get full text
doctoralThesis -
423
RFID localization using single reader antenna. (c2014)
Published 2016“…Our scheme is based on Power Map Matching algorithm. The proposed method employs the use of a Single Stationary Reader Antenna and multitags placed on the asset. …”
Get full text
Get full text
masterThesis -
424
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
Published 2020“…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …”
-
425
A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis
Published 2021“…Specifically, we used a clustering algorithm to group published articles based on the similarity of their abstracts to identify research hotspots and current research directions. …”
-
426
Improving the Resilience of Smart Distribution Networks against Cyber Attacks
Published 2022Get full text
doctoralThesis -
427
Behavior-Based Machine Learning Approaches to Identify State-Sponsored Trolls on Twitter
Published 2020“…We have proposed a set of behavioral features of users' activities on Twitter. Based on these features, we developed four classification models to identify political troll accounts, these models are based on decision tree, random forest, Adaboost, and gradient boost algorithms. …”
-
428
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
Published 2023“…<p dir="ltr">The process of using robotic technology to examine underwater systems is still a difficult undertaking because the majority of automated activities lack network connectivity. …”
-
429
Secrecy Performance of Decode-and-Forward Based Hybrid RF/VLC Relaying Systems
Published 2019“…<p dir="ltr">In this paper, we consider the secrecy of a hybrid radio frequency (RF)/visible light communication (VLC) system equipped with decode-and-forward relaying. We develop physical layer security algorithms that mitigate eavesdropping on both RF and VLC networks based on zero-forcing beamforming techniques. …”
-
430
Utilization of AI to Predict Shear Strength Parameters of Soil Based on Their Physical Properties
Published 2025Get full text
doctoralThesis -
431
Defining quantitative rules for identifying influential researchers: Insights from mathematics domain
Published 2024“…The rules were developed for each parameter category using the Decision Tree Algorithm, which achieved an average accuracy of 70 to 75 percent for identifying awardees in mathematics domains. …”
-
432
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
Published 2021“…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…”
-
433
-
434
-
435
Enhancement of SAR Speckle Denoising Using the Improved Iterative Filter
Published 2020“…Simulated, airborne (ESAR, Oberpfaffenhofen Germany) and spaceborne (Sentinel 1, Palm Jumeirah Dubai UAE) SAR data were used to assess the filtering performances of the studied filters.…”
Get full text
article -
436
FPGA-Based Network Traffic Classification Using Machine Learning
Published 2020“…The proposed design achieves an average throughput of 163.24 Gbps, exceeding throughputs of reported hardware-based classifiers that use comparable approaches, which in turn ensures the continuity of realtime traffic classification at congested data centers.…”
Get full text
article -
437
Extreme Early Image Recognition Using Event-Based Vision
Published 2023“…<p dir="ltr">While deep learning algorithms have advanced to a great extent, they are all designed for frame-based imagers that capture images at a high frame rate, which leads to a high storage requirement, heavy computations, and very high power consumption. …”
-
438
DRL-Based IRS-Assisted Secure Hybrid Visible Light and mmWave Communications
Published 2024“…The DDPG algorithm can adapt to channel variations due to user movement and high-dimensional factors. …”
-
439
-
440
Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT)
Published 2015“…Looking at the historical data of students, fuzzy logic can be used to develop rules based on these data. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject