Search alternatives:
developing rapid » developing a (Expand Search)
rapid algorithm » rd algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
te algorithm » rd algorithm (Expand Search), deer algorithm (Expand Search), _ algorithms (Expand Search)
element te » elementi per (Expand Search)
developing rapid » developing a (Expand Search)
rapid algorithm » rd algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
te algorithm » rd algorithm (Expand Search), deer algorithm (Expand Search), _ algorithms (Expand Search)
element te » elementi per (Expand Search)
-
601
Performance Analysis of Artificial Neural Networks in Forecasting Financial Time Series
Published 2013Get full text
doctoralThesis -
602
Dynamic single node failure recovery in distributed storage systems
Published 2017“…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …”
Get full text
Get full text
Get full text
Get full text
article -
603
Deepfakes Signatures Detection in the Handcrafted Features Space
Published 2023“…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
Get full text
-
604
Machine Learning-Based Approach for EV Charging Behavior
Published 2021Get full text
doctoralThesis -
605
-
606
Systems biology analysis reveals NFAT5 as a novel biomarker and master regulator of inflammatory breast cancer
Published 2015“…</p><h3>Methods</h3><p dir="ltr">In-silico modeling and Algorithm for the Reconstruction of Accurate Cellular Networks (ARACNe) on IBC/non-IBC (nIBC) gene expression data (n = 197) was employed to identify novel master regulators connected to the IBC phenotype. …”
-
607
Artificial Intelligence for Skin Cancer Detection: Scoping Review
Published 2021“…Hence, to aid in diagnosing skin cancer, artificial intelligence (AI) tools are being used, including shallow and deep machine learning–based methodologies that are trained to detect and classify skin cancer using computer algorithms and deep neural networks.…”
-
608
Novel Multi Center and Threshold Ternary Pattern Based Method for Disease Detection Method Using Voice
Published 2020“…The artificial neural network (ANN), support vector machine (SVM) and deep learning models, especially the convolutional neural network (CNN), are the most commonly used machine learning approaches where they proved to be performance in most cases. Voice disorders are rapidly spreading especially with the development of medical diagnostic systems, although they are often underestimated. …”
-
609
A Survey and Comparison of Post-Quantum and Quantum Blockchains
Published 2023“…Notably, the emergence of Shor’s and Grover’s algorithms raises concerns regarding the compromise of the cryptographic systems underlying blockchains. …”
-
610
Axes-Based Encryption Key
Published 2018“…For this, a need of robust security systems is raised to ensure that our data will be kept safe. This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
611
Resilience analytics: coverage and robustness in multi-modal transportation networks
Published 2018“…In this work, we propose MUME, an efficient algorithm for Multi-modal Urban Mobility Estimation, that takes advantage of the special structure of the supra-Laplacian matrix of the transportation multiplex, to compute the coverage of the system. …”
-
612
A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications
Published 2011“…However, the computational as well as memory access requirements of compression algorithms could consume more energy than simply transmitting data uncompressed. …”
Get full text
Get full text
Get full text
article -
613
Privacy Preserving Cancellable Template Generation for Crypto-Biometric Authentication System
Published 2025“…The proposed methodology not only ensures the protection of biometric data in storage but also facilitates secure data retrieval for authentication purposes. …”
-
614
Decision-level Gait Fusion for Human Identification at a Distance
Published 2014Get full text
doctoralThesis -
615
Reactive transport in porous media: a review of recent mathematical efforts in modeling geochemical reactions in petroleum subsurface reservoirs
Published 2021“…<div><p>The rapid advancements in the computational abilities of numerical simulations have attracted researchers to work on the area of reactive transport in porous media to improve the hydrocarbon production processes from mature reservoirs. …”
-
616
Computer-aided detection of Melanoma using geometric features
Published 2017“…Melanoma is one type of skin cancer that usually develops from prolonged exposure to UV light. The latter triggers mutations that lead skin cells to multiply rapidly and form malignant tumors. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
617
Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security
Published 2024“…The time efficiency of both proposed algorithms renders them well-suited for deployment in IoT ecosystems. …”
-
618
-
619
Modelling of pollutant transport in compound open channels
Published 1998“…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …”
Get full text
Get full text
masterThesis -
620