Search alternatives:
te algorithm » rd algorithm (Expand Search), deer algorithm (Expand Search), _ algorithms (Expand Search)
element te » elementi per (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
finding » findings (Expand Search)
te algorithm » rd algorithm (Expand Search), deer algorithm (Expand Search), _ algorithms (Expand Search)
element te » elementi per (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
finding » findings (Expand Search)
-
141
-
142
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
Published 2024“…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …”
-
143
A Clinically Interpretable Approach for Early Detection of Autism Using Machine Learning With Explainable AI
Published 2025“…After handling missing values, balancing the dataset, and analyzing the classifier’s performance, it is found that tree-based algorithms, particularly RF, perform better for all the datasets. …”
-
144
Information warfare. (c2015)
Published 2015“…In addition, we will implement the algorithm and compare its performance to other detection and recovery algorithms.…”
Get full text
Get full text
masterThesis -
145
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
Get full text
Get full text
Get full text
article -
146
Turbo-charging dominating set with an FPT subroutine
Published 2017“…Turbo-charging is a recent algorithmic technique that is based on the fixed-parameter tractability of the dynamic versions of some problems as a way to improve heuristics. …”
Get full text
Get full text
Get full text
conferenceObject -
147
Assigning proctors to exams using scatter search. (c2006)
Published 2006Get full text
Get full text
masterThesis -
148
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
-
149
Complexity Avoidance using Biological Resemblance of Modular Multivariable Structure
Published 2014“…Combination of Fuzzy logic and Genetic Algorithm is becoming popular among researchers in the field. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
150
Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring
Published 2020“…However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. …”
-
151
A Blockchain Model for Secure Communications in Internet of Vehicles
Published 2021“…The simulation results demonstrated the good performance of the HPBC algorithm when implemented within the IoV environment.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
152
Solution of Fractional Differential Equations: Transform and Iterative Methods Approach
Published 2019Get full text
doctoralThesis -
153
Optimal Routing Protocol in Multimedia Wireless Sensor Networks
Published 2011Get full text
doctoralThesis -
154
-
155
Developing a resilient framework for electric vehicle charging stations harnessing solar energy, standby batteries and grid integration with advanced control mechanisms
Published 2024“…To achieve optimal power management within the charging station, MATLAB/Simulink is used to implement and rigorously test the proposed system. …”
-
156
A reduced model for phase-change problems with radiation using simplified PN approximations
Published 2025“…A Newton-based algorithm is also adopted for solving the nonlinear systems resulting from the considered monolithic approach. …”
Get full text
article -
157
Low Cost Autopilot Design Using Fuzzy Supervisory Control
Published 2005Get full text
doctoralThesis -
158
Artificial Intelligence in Predicting Cardiac Arrest: Scoping Review
Published 2021“…There is a need for more reviews to learn the obstacles to the implementation of AI technologies in clinical settings. …”
-
159
Isolating Physical Replacement of Identical IoT Devices Using Machine and Deep Learning Approaches
Published 2021Get full text
doctoralThesis -
160
Regression testing web services-based applications
Published 2006“…In this paper, we present a safe regression testing algorithm that selects an adequate number of non-redundant test sequences aiming to find modification-related errors. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject