Search alternatives:
fusion algorithm » auction algorithm (Expand Search), cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
element » elements (Expand Search)
fusion algorithm » auction algorithm (Expand Search), cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
element » elements (Expand Search)
-
1
Decision-level Gait Fusion for Human Identification at a Distance
Published 2014Get full text
doctoralThesis -
2
-
3
-
4
-
5
Bird’s Eye View feature selection for high-dimensional data
Published 2023“…This approach is inspired by the natural world, where a bird searches for important features in a sparse dataset, similar to how a bird search for sustenance in a sprawling jungle. BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …”
-
6
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…The research work carried out, in relation to attack detection ensemble learning, mainly aims to increase the performance of machine learning algorithms by combining their results. …”
Get full text
-
7
An Optimized Feature Selection Technique in Diversified Natural Scene Text for Classification Using Genetic Algorithm
Published 2021“…First after preprocessing input images, the whole feature space (population) is built using a multimodal feature representation technique. Second, a feature level fusion approach is used to combine the features. …”
-
8
Multi-Modal Emotion Aware System Based on Fusion of Speech and Brain Information
Published 2019“…This basically follows either a feature-level or decision-level strategy. In all likelihood, while features from several modalities may enhance the classification performance, they might exhibit high dimensionality and make the learning process complex for the most used machine learning algorithms. …”
Get full text
Get full text
-
9
-
10
Unsupervised outlier detection in multidimensional data
Published 2022“…Furthermore, the existence of anomalies in the data can heavily degrade the performance of machine learning algorithms. In order to detect the anomalies in a dataset in an unsupervised manner, some novel statistical techniques are proposed in this paper. …”
-
11
Hardware design and VLSI implementation of a byte-wise CRCgenerator chip
Published 1995“…The algorithm is based on the work presented by Perez, Wismer and Becker (1983) in which a software implementation was proposed. …”
Get full text
Get full text
article -
12
-
13
Spectrum Sensing Algorithms for Cooperative Cognitive Radio Networks
Published 2010Get full text
doctoralThesis -
14
HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP
Published 2020“…The algorithm is based on the work presented in [10] in which a software implementation was proposed. …”
Get full text
article -
15
Collision-Free Autonomous Navigation Solution for Mobile Wheeled
Published 2023Get full text
doctoralThesis -
16
-
17
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …”
Get full text
-
18
Detection of statistically significant network changes in complex biological networks
Published 2017“…Moreover, the structure of the proposed algorithm allows for a faster parallelized implementation.…”
-
19
Modified arithmetic optimization algorithm for drones measurements and tracks assignment problem
Published 2023“…On the other hand, the optimization of the problem is implemented using several evolutionary-based metaheuristic algorithms. …”
Get full text
-
20
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
Published 2015“…All the approach components and algorithms realizing the proposed analysis semantics have been implemented in one development framework. …”
Get full text
Get full text
Get full text
article