Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
ppm algorithm » rd algorithm (Expand Search)
elements ppm » elements _ (Expand Search), elementi per (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
implementing » implemented (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
ppm algorithm » rd algorithm (Expand Search)
elements ppm » elements _ (Expand Search), elementi per (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
implementing » implemented (Expand Search)
-
381
Design and analysis of efficient and secure elliptic curve cryptoprocessors.
Published 2006Get full text
masterThesis -
382
FPGA-Based Network Traffic Classification Using Machine Learning
Published 2019Get full text
doctoralThesis -
383
LDSVM: Leukemia Cancer Classification Using Machine Learning
Published 2022“…However, they are not highly effective in improving results and are frequently employed by doctors for cancer diagnosis. This study proposes a novel method using machine learning algorithms based on microarrays of leukemia GSE9476 cells. …”
-
384
Exploring AI Conversational Chatbot UX Design: Insights from High School
Published 2025“…The authors in this study conducted a semi-structured qualitative interview with six high school students in UAE and the MAXQDA Analytics software—ver. 22.6.0 is implemented by processing the thematic analysis to study the findings. …”
Get full text
-
385
Condenser capacity and hyperbolic perimeter
Published 2022“…<p dir="ltr">We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
-
386
UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks
Published 2018“…Moreover, we propose a set of effective algorithms to generate solutions for relatively large-scale network scenarios. …”
Get full text
Get full text
Get full text
Get full text
article -
387
-
388
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…The method used in this research is a classification of models and algorithms used in data mining. …”
Get full text
-
389
Cooperative Caching Policy in Fog Computing for Connected Vehicles
Published 2023“…In this thesis, we implemented cooperation between a Deep Reinforcement Learning (DRL) model and Federated Learning to improve caching in Connected Vehicles connected to fog nodes. …”
Get full text
Get full text
Get full text
masterThesis -
390
Industrial Internet of Things enabled technologies, challenges, and future directions
Published 2023“…For instance, fog computing reduces parking, platform, fuel, and CO2 emissions. A blockchain-based security framework for the cement sector can resolve 51% of security issues and Sybil attacks caused by consensus algorithms like Proof of Work (PoW). …”
Get full text
Get full text
Get full text
article -
391
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
Published 2024“…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …”
-
392
Using C++ to Calculate SO(10) Tensor Couplings
Published 2021“…Therefore, there exists an opportunity to leverage the abilities of computer software in order to algorithmically perform these calculations on demand. …”
Get full text
article -
393
Integrated Energy Optimization and Stability Control Using Deep Reinforcement Learning for an All-Wheel-Drive Electric Vehicle
Published 2025“…To evaluate the generalizability of the algorithms, the agents are tested across various velocities, tire–road friction coefficients, and additional scenarios implemented in IPG CarMaker, a high-fidelity vehicle dynamics simulator. …”
-
394
Unsupervised outlier detection in multidimensional data
Published 2022“…Furthermore, the existence of anomalies in the data can heavily degrade the performance of machine learning algorithms. In order to detect the anomalies in a dataset in an unsupervised manner, some novel statistical techniques are proposed in this paper. …”
-
395
Localizing-ground Transmitters Using Airborne Antenna Array
Published 2020Get full text
doctoralThesis -
396
Common weaving approach in mainstream languages for software security hardening
Published 2013“…To achieve this goal, we present a formal specification for GIMPLE weaving and the implementation strategies of the proposed weaving semantics. …”
Get full text
Get full text
Get full text
article -
397
FPGA-Based Network Traffic Classification Using Machine Learning
Published 2020“…The results of the conducted experiments indicate that random forest outperforms other algorithms achieving a maximum accuracy of 98.5% and an F-score of 0.932. …”
Get full text
article -
398
Enhanced climate change resilience on wheat anther morphology using optimized deep learning techniques
Published 2024“…Various Deep Learning algorithms, including Convolution Neural Network (CNN), LeNet, and Inception-V3 are implemented to classify the records and extract various patterns. …”
-
399
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
Published 2024“…It had an impressive accuracy of 99.99%, and it could mitigate DDoS attacks in less than 3 s. We conducted a comparative analysis of various models and algorithms used in the related works. …”
-
400
Industrial Internet of Things enabled technologies, challenges, and future directions
Published 2023“…For instance, fog computing reduces parking, platform, fuel, and CO<sub>2</sub> emissions. A blockchain-based security framework for the cement sector can resolve 51% of security issues and Sybil attacks caused by consensus algorithms like Proof of Work (PoW). …”