Search alternatives:
developing robust » developing 21st (Expand Search)
using algorithms » cosine algorithm (Expand Search)
robust algorithm » mould algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
developing robust » developing 21st (Expand Search)
using algorithms » cosine algorithm (Expand Search)
robust algorithm » mould algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
-
661
A novel few shot learning derived architecture for long-term HbA1c prediction
Published 2024“…Short-term CGM time-series data are processed using both novel image transformation approaches, as well as using conventional signal processing methods. …”
-
662
Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks
Published 2024“…Our systematic review covers a range of AI algorithms, including traditional ML, and advanced neural network models, such as Transformers, illustrating their effectiveness in IDS applications within IVNs. …”
-
663
A Hardware Model of an Expandable RSA Cryptogrsphic System
Published 1998“…Data security is an important aspect of information transmission and storage in an electronic form. …”
Get full text
masterThesis -
664
Multi Agent Reinforcement Learning Approach for Autonomous Fleet Management
Published 2019Get full text
doctoralThesis -
665
Enhanced DC Microgrid Protection: a Neural Network and Wavelet Transform Approach
Published 2024Get full text
doctoralThesis -
666
A forward-backward Kalman for the estimation of time-variant channels in OFDM
Published 2005“…In this paper, we propose an expectation-maximization (EM) algorithm for joint channel and data recovery. The algorithm makes use of the rich structure of the underlying communication problem-a structure induced by the data and channel constraints. …”
Get full text
Get full text
article -
667
Enhanced Deep Belief Network Based on Ensemble Learning and Tree-Structured of Parzen Estimators: An Optimal Photovoltaic Power Forecasting Method
Published 2021“…The hyper-parameters of the proposed stacking ensemble are carefully tuned using the tree-structured of parzen estimators algorithm to achieve top-notch predictive performance. …”
-
668
-
669
Hardware Model of an Expandable RSA Cryptographic System
Published 1998“…Data security is an important aspect of information transmission and storage in an electronic form. …”
Get full text
Get full text
Get full text
masterThesis -
670
A Geometric-Primitives-Based Compression Scheme for Testing Systems-on-a-Chip
Published 2001“…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data.…”
Get full text
article -
671
A geometric-primitives-based compression scheme for testingsystems-on-a-chip
Published 2001“…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data…”
Get full text
Get full text
article -
672
-
673
Framework for rapid design and optimisation of immersive battery cooling system
Published 2025“…Two key parameters are optimised, namely: battery gap spacing (3–10 mm) and inlet/outlet width (5–15 mm), via Optimal Latin Hypercube Sampling, Support Vector Regression, and GDE3 algorithm. Palm biodiesel is used as a dielectric coolant in the proposed system to preserve LIB temperature within 20–40°C, preventing thermal runaway and ensuring a lightweight BTMS design. …”
-
674
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
Published 2021“…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …”
Get full text
-
675
Information Warfare
Published 2015“…The algorithm is based on data dependency and uses a single matrix that will be later used during recovery.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
676
Uplink Noma in UAV-Assisted IoT Networks
Published 2022“…Given the complexity of the problem and the incomplete knowledge about the environment, the problem is divided into two subproblems: the first models the UAV trajectory and the selection of the first device in the NOMA cluster at each time slot as a Markov Decision Process, and uses Proximal Policy Optimization to solve it. The second device is then selected using a heuristic algorithm based on prioritizing devices with higher bit rate requirements and strict deadlines. …”
Get full text
Get full text
Get full text
masterThesis -
677
Severity-Based Prioritized Processing of Packets with Application in VANETs
Published 2019“…Also, the proposed heuristic is tested against a non-prioritized processing algorithm that works using first come first served policy. …”
-
678
Local convexity preserving rational cubic spline curves
Published 1997“…An algorithm is presented which constructs a curve by interpolating the given data points. …”
Get full text
Get full text
article -
679
Vehicular-OBUs-As-On-Demand-Fogs
Published 2020“…For instance, real-time vehicular applications require fast processing of the vast amount of generated data by vehicles in order to maintain service availability and reachability while driving. …”
Get full text
Get full text
Get full text
Get full text
article -
680
Recovery of business intelligence systems
Published 2018“…The efficiency of the data recovery algorithm is substantial for e-healthcare systems. …”
Get full text
Get full text
Get full text
Get full text
article