Search alternatives:
developing based » developing a (Expand Search), developing 21st (Expand Search)
data detection » data injection (Expand Search)
rast algorithm » jaya algorithm (Expand Search), rd algorithm (Expand Search)
developing based » developing a (Expand Search), developing 21st (Expand Search)
data detection » data injection (Expand Search)
rast algorithm » jaya algorithm (Expand Search), rd algorithm (Expand Search)
-
421
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
Published 2021“…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …”
Get full text
-
422
Modeling and Control of a Thermally Driven MEMS Actuator for RF Applications
Published 2017Get full text
doctoralThesis -
423
LNCRI: Long Non-Coding RNA Identifier in Multiple Species
Published 2021“…To overcome these challenges we developed LNCRI (Long Non-Coding RNA Identifier), a novel machine learning (ML)-based tool for the identification of lncRNA transcripts. …”
-
424
Spatiotemporal Mapping and Monitoring of Mangrove Forests Changes From 1990 to 2019 in the Northern Emirates, UAE Using Random Forest, Kernel Logistic Regression and Naive Bayes Tr...
Published 2020“…The approach was developed based on random forest (RF), Kernel logistic regression (KLR), and Naive Bayes Tree machine learning algorithms which use multitemporal Landsat images. …”
Get full text
article -
425
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
Published 2022“…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. In this paper, we proposed a novel technique in steganography within the digital images such is RGB, Gray Scale, Texture, Aerial images to achieve higher security, imperceptibility, capacity, and robustness as compared with existing methods. …”
-
426
PAST-AI: Physical-Layer Authentication of Satellite Transmitters via Deep Learning
Published 2022“…<p dir="ltr">Physical-layer security is regaining traction in the research community, due to the performance boost introduced by deep learning classification algorithms. This is particularly true for sender authentication in wireless communications via radio fingerprinting. …”
-
427
An XML Document Comparison Framework
Published 2001“…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
Get full text
Get full text
Get full text
article -
428
A reduced model for phase-change problems with radiation using simplified PN approximations
Published 2025“…To solve the coupled equations, we implement a second-order implicit scheme for the time integration and a mixed finite element method for the space discretization. A Newton-based algorithm is also adopted for solving the nonlinear systems resulting from the considered monolithic approach. …”
Get full text
article -
429
Design of A Theoretical Framework For A Real-Time Fire Evacuation Guidance System
Published 2020Get full text
doctoralThesis -
430
Modelling of pollutant transport in compound open channels
Published 1998“…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …”
Get full text
Get full text
masterThesis -
431
Applications of artificial intelligence in emergency and critical care diagnostics: a systematic review and meta-analysis
Published 2024“…It uses various models and algorithms to detect patterns and specific findings to diagnose a disease with utmost accuracy. …”
-
432
Evolutionary support vector regression for monitoring Poisson profiles
Published 2023“…This paper aims to monitor Poisson profile monitoring problem in Phase II and develops a new robust control chart using support vector regression by incorporating some novel input features and evolutionary training algorithm. …”
-
433
Metallic coating thickness assessment over nonmagnetic metals using eddy current technology
Published 2019Get full text
doctoralThesis -
434
MoveSchedule
Published 1995“…The layout construction algorithm that underlies MoveSchedule uses Constraint Satisfaction to find the set of all positions that meet the constraints on resources' positions and Linear Programming to find the optimal positions that minimize resource transportation and relocation costs. …”
Get full text
Get full text
Get full text
masterThesis -
435
An Event-Triggered Robust Attitude Control of Flexible Spacecraft With Modified Rodrigues Parameters Under Limited Communication
Published 2019“…The control law is developed using a state-dependent single feedback vector, which further assists in obeying the constrained network. …”
-
436
Advancing Data Center Networks: A Focus on Energy and Cost Efficiency
Published 2023“…These topologies must incorporate fault-tolerant and efficient routing algorithms. Consequently, the data center network topology must dynamically adapt to ever-changing application requirements. …”
-
437
Assessment of Inventory and Transportation Collaboration in a Logistics Marketplace
Published 2020Get full text
doctoralThesis -
438
-
439
Predicting the Heats of Fusion of Ionic Liquids via Group Contribution Modeling and Machine Learning
Published 2022Get full text
doctoralThesis -
440
Prediction the performance of multistage moving bed biological process using artificial neural network (ANN)
Published 2020“…To cope with this difficult task and perform an effective and well-controlled BP operation, an artificial neural network (ANN) algorithm was developed to simulate, model, and control a three-stage (anaerobic/anoxic and MBBR) enhanced nutrient removal biological process (ENR-BP) challenging real wastewater. …”