Search alternatives:
making algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
element » elements (Expand Search)
making algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
element » elements (Expand Search)
-
161
CEAP
Published 2016“…The infrastructureless and decentralized nature of Vehicular Ad Hoc Network (VANET) makes it quite vulnerable to different types of malicious attacks. …”
Get full text
Get full text
Get full text
Get full text
article -
162
Autism Detection of MRI Brain Images Using Hybrid Deep CNN With DM-Resnet Classifier
Published 2023“…The hyper parameters are optimized with DM optimization algorithm which improves the accuracy of classifier. …”
Get full text
Get full text
-
163
Random vector functional link network: Recent developments, applications, and future directions
Published 2023“…To overcome these issues, randomization based neural networks such as random vector functional link (RVFL) network have been proposed. …”
-
164
Applications of fast fourier transform in the integrity evaluation of deep foundations
Published 2016“…The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …”
Get full text
Get full text
Get full text
Get full text
article -
165
PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits
Published 2022“…<p>Promoting healthy discourse on community-based online platforms like Reddit can be challenging, especially when conversations show ominous signs of toxicity. …”
-
166
Optimized 3D Deployment of UAV-Mounted Cloudlets to Support Latency-Sensitive Services in IoT Networks
Published 2019“…We formulate the problem as a mixed integer program, and propose an efficient meta-heuristic solution based on the ions motion optimization algorithm. …”
Get full text
Get full text
Get full text
Get full text
article -
167
-
168
Localizing-ground Transmitters Using Airborne Antenna Array
Published 2020Get full text
doctoralThesis -
169
Cooperative clustering models for Vehicular ad hoc networks. (c2013)
Published 2013Get full text
Get full text
masterThesis -
170
Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants
Published 2024“…<p dir="ltr">The study aims to assess the factors that engage and accentuate usage pertaining to consumers with artificial intelligence-based voice assistants. …”
-
171
Privacy-preserving energy optimization via multi-stage federated learning for micro-moment recommendations
Published 2025“…<p>Human behavior significantly impacts domestic energy consumption, making it essential to monitor and improve these consumption patterns. …”
-
172
Deep Learning in Smart Grid Technology: A Review of Recent Advancements and Future Prospects
Published 2021“…In this context, SG stands tied very closely to Deep Learning (DL) as an emerging technology for creating a more decentralized and intelligent energy paradigm while integrating high intelligence in supervisory and operational decision-making. Motivated by the outstanding success of DL-based prediction methods, this article attempts to provide a thorough review from a broad perspective on the state-of-the-art advances of DL in SG systems. …”
-
173
Developing an online hate classifier for multiple social media platforms
Published 2020“…While all the models significantly outperform the keyword-based baseline classifier, XGBoost using all features performs the best (F1 = 0.92). …”
-
174
Distinguishing Between Fake and Real Smiles Using EEG Signals and Deep Learning
Published 2020Get full text
doctoralThesis -
175
A Framework for Predictive Modeling in Sustainable Projects
Published 2012Get full text
doctoralThesis -
176
Low Cost Autopilot Design Using Fuzzy Supervisory Control
Published 2005Get full text
doctoralThesis -
177
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
Published 2022“…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. In this paper, we proposed a novel technique in steganography within the digital images such is RGB, Gray Scale, Texture, Aerial images to achieve higher security, imperceptibility, capacity, and robustness as compared with existing methods. …”
-
178
Fine-grain watermarking for intellectual property protection
Published 2019“…In particular, the embedding and extraction algorithms allow to continuously protect the watermark through the whole document in a fine-grain fashion. …”
-
179
Resilience analytics: coverage and robustness in multi-modal transportation networks
Published 2018“…A future goal is to use this experience to make projections for a fast growing city like Doha.…”
-
180
Adaptive PPO With Multi-Armed Bandit Clipping and Meta-Control for Robust Power Grid Operation Under Adversarial Attacks
Published 2025“…This paper proposes a novel composite enhanced proximal policy optimization (CePPO) algorithm to improve power grid operation under adversarial conditions. …”