Search alternatives:
custom algorithm » control algorithm (Expand Search), auction algorithm (Expand Search), cosine algorithm (Expand Search)
means algorithm » search algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
models using » model using (Expand Search)
custom algorithm » control algorithm (Expand Search), auction algorithm (Expand Search), cosine algorithm (Expand Search)
means algorithm » search algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
models using » model using (Expand Search)
-
681
An intelligent approach to predicting the effect of nanoparticle mixture ratio, concentration and temperature on thermal conductivity of hybrid nanofluids
Published 2020“…A polynomial correlation model, the adaptive neuro-fuzzy inference system model and an artificial neural network model optimised with three different learning algorithms. …”
-
682
Decision-level Gait Fusion for Human Identification at a Distance
Published 2014Get full text
doctoralThesis -
683
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
Published 2021“…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…”
-
684
A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem
Published 2008“…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …”
Get full text
Get full text
Get full text
article -
685
Adaptive Federated Learning Architecture To Mitigate Non-IID Through Multi-Objective GA-Based Efficient Client Selection
Published 2024“…Existing solutions still have several constraints leading to suboptimal model performance and slow convergence. In this paper, we propose a novel approach that incorporates genetic algorithms with an enhanced client selection strategy, utilizing client metadata rather than raw data. …”
Get full text
Get full text
Get full text
masterThesis -
686
Single-channel speech denoising by masking the colored spectrograms
Published 2025“…The results show that with masking-based targets, the colored spectrograms provide an improvement of 0.12 points in perceptual evaluation of speech quality (PESQ) score, 4 % in short time objective intelligibility (STOI), and a 163 times reduction in network learnable parameters, as compared to when they are processed by a mapping-based model using pix2pix generative adversarial network (GAN) followed by a feedforward regression neural network. …”
-
687
Dynamic multiple node failure recovery in distributed storage systems
Published 2018“…The contribution of this paper is four-fold: i. we generate an optimized block distribution scheme that minimizes the total system repair cost of all dependent and independent multiple node failure scenarios; ii. we address the practical scenario of having newly arriving blocks and allocate those blocks to existing nodes without any modification to the original on-node block distribution; iii. we consider new-comer nodes and generate an updated optimized block distribution; iv. we consider optimized storage and recovery of blocks with varying priority using variable fractional repetition codes. The four problems are modeled using incidence matrices and solved heuristically. …”
Get full text
Get full text
Get full text
Get full text
article -
688
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
Published 2021“…The technology stack of the proposed solution was also implemented with four algorithms and eight protocols. The evaluation results of the proposed solution were compared to the results of standard solutions under different cyberattack scenarios using quantitative research methods involving computing simulations, emulation experiments, and analytical modeling. …”
Get full text
-
689
Predicting Cardiovascular Disease in Patients with Machine Learning and Feature Engineering Techniques
Published 2022“…As a result, the research proposes a model for predicting the likelihood of heart disease incidence using logistic regression capabilities.…”
Get full text
Get full text
-
690
Software defect prediction. (c2019)
Published 2019“…One that focuses on predicting defect in software modules using a hybrid heuristic - a combination of Particle Swarm Optimization (PSO) and Genetic Algorithms (GA). …”
Get full text
Get full text
Get full text
masterThesis -
691
Clustering and Stochastic Simulation Optimization for Outpatient Chemotherapy Appointment Planning and Scheduling
Published 2022“…A Stochastic Discrete Simulation-Based Multi-Objective Optimization (SDSMO) model is developed and linked to clustering algorithms using an iterative sequential approach. …”
-
692
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
Published 2021“…Its security has been verified formally using Random Oracle Model (ROM), ProVerif2.02 and informally using assumptions and pragmatic illustration. …”
-
693
Condenser capacity and hyperbolic perimeterImage 1
Published 2021“…We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
Get full text
Get full text
Get full text
article -
694
A Multi-Channel Convolutional Neural Network approach to automate the citation screening process
Published 2021“…This study aims to automate the citation screening process using Deep Learning algorithms. With this, it is aimed to reduce the time and costs of the citation screening process and increase the precision and recall of the relevant primary studies. …”
-
695
A Novel Approach for Detecting Anomalous Energy Consumption Based on Micro-Moments and Deep Neural Networks
Published 2022“…This paper introduces a new solution to detect energy consumption anomalies based on extracting micro-moment features using a rule-based model. The latter is used to draw out load characteristics using daily intent-driven moments of user consumption actions. …”
-
696
Design and analysis of efficient and secure elliptic curve cryptoprocessors.
Published 2006“…The proposed architectures have been modeled using VHDL and implemented on FPGA platform.…”
Get full text
masterThesis -
697
Condenser capacity and hyperbolic perimeter
Published 2022“…<p dir="ltr">We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
-
698
Fear from COVID-19 and technology adoption: the impact of Google Meet during Coronavirus pandemic
Published 2020“…The data obtained from the study were analyzed by using the partial least squares structural equation modeling (PLS-SEM) and machine learning algorithms. …”
Get full text
Get full text
-
699
Practical Multiple Node Failure Recovery in Distributed Storage Systems
Published 2016“…The problem is solved using genetic algorithms that search within the feasible solution space. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
700
A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications
Published 2011“…The derived empirical model is then used to obtain energy consumption results for file sharing over multihop scenarios.…”
Get full text
Get full text
Get full text
article