Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
cc3d algorithm » rd algorithm (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
implementing » implemented (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
cc3d algorithm » rd algorithm (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
implementing » implemented (Expand Search)
-
281
Efficient unified Montgomery inversion with multi-bit shifting
Published 2005“…Since the existing algorithms based on the extended Euclidean algorithm do not permit a fast software implementation, projective co-ordinates, which eliminate almost all of the inversion operations from the curve arithmetic, are preferred. …”
Get full text
Get full text
article -
282
Benchmarking Concept Drift Detectors for Online Machine Learning
Published 2022“…Namely, this paper evaluates the perfor mance of sixteen different drift detection methods using three different metrics: accuracy, runtime, and memory usage. To guarantee a fair com parison, MOA is used. Fourteen algorithms are implemented in MOA. …”
Get full text
Get full text
Get full text
-
283
Toward automatic motivator selection for autism behavior intervention therapy
Published 2022“…We use a Q-learning algorithm to solve the modeled problem. …”
Get full text
Get full text
-
284
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
-
285
PSYCHOLOGICAL EMOTION RECOGNITION OF STUDENTS USING MACHINE LEARNING BASED CHATBOT
Published 2023“…In this paper, we propose a chatbot for detecting the students feeling by using machine-learning algorithms. …”
Get full text
Get full text
-
286
-
287
An Improved Genghis Khan Optimizer based on Enhanced Solution Quality Strategy for Global Optimization and Feature Selection Problems
Published 2024“…However, these methods tend to converge towards local solutions with a low convergence rate. In order to address this issue in GKSO, a more refined version called I-GKSO is implemented. …”
Get full text
-
288
New aspect-oriented constructs for security hardening concerns
Published 2009“…Moreover, we show the viability and correctness of the proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the result of explanatory case studies.…”
Get full text
Get full text
Get full text
article -
289
PERF solutions for distributed query optimization. (c1999)
Published 1999Get full text
Get full text
masterThesis -
290
Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE
Published 2018“…In addition to building a prediction model to examine if a school will improve in the future TIMSS assessment cycles. …”
Get full text
-
291
-
292
Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité
Published 2009“…Moreover, we show the viability and correctness of our proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the results of explanatory case studies.…”
Get full text
Get full text
Get full text
article -
293
An Incentivized and Optimized Dynamic Mechanism for Demand Response for Managing Voltage in Distribution Networks
Published 2022“…A holistic and practical approach of DR implementation is missing in the literature. …”
-
294
An aspect-oriented framework for systematic security hardening of software
Published 2008“…We also explore the viability of the proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the result of explanatory case studies. …”
Get full text
Get full text
Get full text
masterThesis -
295
Supervised term-category feature weighting for improved text classification
Published 2022“…It builds a term-category TF-ICF matrix using an iterative and additive algorithm that produces category vector representations and updates until reaching convergence. …”
Get full text
Get full text
Get full text
Get full text
article -
296
Fast Transient Stability Assessment of Power Systems Using Optimized Temporal Convolutional Networks
Published 2024“…The proposed TCN-GWO uses both synchronously sampled values and synthetic values from various bus systems. In a postfault scenario, a copula of processing blocks is implemented to ensure the reliability of the proposed method where high-importance features are incorporated into the TCN-GWO model. …”
-
297
Dynamic Spectrum Scheduling and Management in Centralized Cognitive Radio Networks
Published 2017Get full text
doctoralThesis -
298
Optimal Routing Protocol in Multimedia Wireless Sensor Networks
Published 2011Get full text
doctoralThesis -
299
Dynamic single node failure recovery in distributed storage systems
Published 2017“…We present a wide range of results for the various proposed algorithms and considered scenarios to quantify the achievable performance gains.…”
Get full text
Get full text
Get full text
Get full text
article -
300
IDENTIFICATION AND CONTROL STRATEGY APPLIED IN LOAD MANAGEMENT OF RESIDENTIAL AIR-CONDITIONERS
Published 2004“…An integrated simulation environment was developed wherein the identification and control algorithm were implemented. Also, foundation was laid for carrying out the implementation of this simulated environment on a real Air-Conditioner (A/C) system.…”
Get full text
masterThesis