Showing 21 - 36 results of 36 for search '(( complementary 5a algorithm ) OR ((( second making algorithm ) OR ( neural coding algorithm ))))', query time: 0.10s Refine Results
  1. 21

    Wavelet Analysis- Singular Value Decomposition Based Method for Precise Fault Localization in Power Distribution Networks Using k-NN Classifier by Abhishek Raj (7245425)

    Published 2025
    “…Additionally, the computational efficiency of the algorithm is evidenced by an average processing time of 0.0764 seconds per fault event, making it well-suited for real-time applications.…”
  2. 22

    Assessment of network module identification across complex diseases by Sarvenaz Choobdar (18602821)

    Published 2019
    “…Our robust assessment of 75 module identification methods reveals top-performing algorithms, which recover complementary trait-associated modules. …”
  3. 23
  4. 24

    Scrambled Prime Key Encryption by Haraty, Ramzi A.

    Published 2018
    “…To enhance data security different cryptographic algorithms are used. Nevertheless, but the fast increase in computers' speed may threaten these algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  5. 25
  6. 26

    Oversampling techniques for imbalanced data in regression by Samir Brahim Belhaouari (9427347)

    Published 2024
    “…For tabular data, we also present the Auto-Inflater neural network, utilizing an exponential loss function for Autoencoders. …”
  7. 27

    Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials by Ghouti, Lahouari

    Published 1997
    “…The second scheme based on a modular learning stretegy consisting of three functional blocks, takes into account the nonstationary character of the ultrasonic NDE system and makes use of the " information preserving rule" which allows accurate and reliable classification procedure. …”
    Get full text
    masterThesis
  8. 28

    Legal and Ethical Considerations of Artificial Intelligence for Residents in Post-Acute and Long-Term Care by Barry Solaiman (19160614)

    Published 2024
    “…First, the threat that AI poses to the autonomy of residents can undermine their core needs. Second, how discrimination and bias in algorithmic decision-making can undermine Medicare coverage for PA-LTC, causing doctors' recommendations to be ignored and denying residents the care they are entitled to. …”
  9. 29

    Privacy-preserving energy optimization via multi-stage federated learning for micro-moment recommendations by Md Mosarrof Hossen (21399056)

    Published 2025
    “…<p>Human behavior significantly impacts domestic energy consumption, making it essential to monitor and improve these consumption patterns. …”
  10. 30

    CEAP by Abdel Wahab, Omar

    Published 2016
    “…The infrastructureless and decentralized nature of Vehicular Ad Hoc Network (VANET) makes it quite vulnerable to different types of malicious attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 31
  12. 32

    Developing an online hate classifier for multiple social media platforms by Joni Salminen (7434770)

    Published 2020
    “…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …”
  13. 33
  14. 34
  15. 35

    YOLO-SAIL: Attention-Enhanced YOLOv5 With Optimized Bi-FPN for Ship Target Detection in SAR Images by Prabu Selvam (22330264)

    Published 2025
    “…It has recently become increasingly popular to apply deep learning algorithms to the identification of ships in SAR images. …”
  16. 36

    Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study by Muhammad Atif Butt (10849980)

    Published 2023
    “…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …”