Search alternatives:
using algorithm » cosine algorithm (Expand Search)
levels using » cells using (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
search » research (Expand Search)
using algorithm » cosine algorithm (Expand Search)
levels using » cells using (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
search » research (Expand Search)
-
221
-
222
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…The novelty of this work is, a recently developed DRF optimization methodology incorporated with the machine learning algorithm is utilized for maximizing the security level of IoT systems. …”
-
223
Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model
Published 2024“…The performance level improvements are practically summarized in both the transmission and reception entities with the help of the proposed hybrid network architecture and the associated Dual Deep Network algorithm. …”
-
224
Deep Learning-Based Short-Term Load Forecasting Approach in Smart Grid With Clustering and Consumption Pattern Recognition
Published 2021“…<p>Different aggregation levels of the electric grid's big data can be helpful to develop highly accurate deep learning models for Short-term Load Forecasting (STLF) in electrical networks. …”
-
225
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
Published 2024“…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …”
-
226
A Clinically Interpretable Approach for Early Detection of Autism Using Machine Learning With Explainable AI
Published 2025“…After handling missing values, balancing the dataset, and analyzing the classifier’s performance, it is found that tree-based algorithms, particularly RF, perform better for all the datasets. …”
-
227
Spatially-Distributed Missions With Heterogeneous Multi-Robot Teams
Published 2021“…Both combine a generic MILP solver and a genetic algorithm, resulting in efficient anytime algorithms. …”
-
228
Optimizing clopidogrel dose response
Published 2016“…The aim of the study is to investigate the cumulative effect of CYP2C19 gene polymorphisms and drug interactions that affects clopidogrel dosing, and apply it into a new clinical-pharmacogenetic algorithm that can be used by clinicians in optimizing clopidogrel-based treatment. …”
Get full text
Get full text
Get full text
Get full text
article -
229
Multi-Model Investigation and Adaptive Estimation of the Acoustic Release of a Model Drug From Liposomes
Published 2019“…Unbiased drug-release estimates are realized by implementing an online noise identification algorithm. …”
Get full text
article -
230
Modeling and Guidance of an Underactuated Autonomous Underwater Vehicle
Published 2017Get full text
doctoralThesis -
231
Information warfare. (c2015)
Published 2015“…In addition, we will implement the algorithm and compare its performance to other detection and recovery algorithms.…”
Get full text
Get full text
masterThesis -
232
Collision-Free Autonomous Navigation Solution for Mobile Wheeled
Published 2023Get full text
doctoralThesis -
233
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
Get full text
Get full text
Get full text
article -
234
Turbo-charging dominating set with an FPT subroutine
Published 2017“…Turbo-charging is a recent algorithmic technique that is based on the fixed-parameter tractability of the dynamic versions of some problems as a way to improve heuristics. …”
Get full text
Get full text
Get full text
conferenceObject -
235
Assigning proctors to exams using scatter search. (c2006)
Published 2006Get full text
Get full text
masterThesis -
236
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
-
237
Guidance, Control and Trajectory Tracking of Small Fixed Wing Unmanned Aerial Vehicles (UAV's)
Published 2009Get full text
doctoralThesis -
238
Complexity Avoidance using Biological Resemblance of Modular Multivariable Structure
Published 2014“…Combination of Fuzzy logic and Genetic Algorithm is becoming popular among researchers in the field. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
239
Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring
Published 2020“…However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. …”
-
240
A Blockchain Model for Secure Communications in Internet of Vehicles
Published 2021“…The simulation results demonstrated the good performance of the HPBC algorithm when implemented within the IoV environment.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject