Search alternatives:
element control » tolerant control (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element control » tolerant control (Expand Search)
using algorithm » cosine algorithm (Expand Search)
-
101
IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture
Published 2025“…The IoMT manufacturers need to offer their products at a competitive price, which forces them to use simplified architecture, leaving limited and, to some extent, no scope to employ sophisticated cybersecurity algorithms. …”
-
102
Supervised term-category feature weighting for improved text classification
Published 2022“…It builds a term-category TF-ICF matrix using an iterative and additive algorithm that produces category vector representations and updates until reaching convergence. …”
Get full text
Get full text
Get full text
Get full text
article -
103
A Neuro-Heuristic Approach for Segmenting Handwritten Arabic Text
Published 2001“…A conventional algorithm is used for the initial segmentation of the text into connected blocks of characters. …”
Get full text
Get full text
Get full text
conferenceObject -
104
-
105
-
106
Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm
Published 2022“…The antecedent part parameters (Gaussian membership function parameters) are encoded as a population of artificial swarm of grasshoppers and optimized using its algorithm. Tuning of the consequent part parameters are accomplished using extreme learning machine. …”
-
107
-
108
Practical single node failure recovery using fractional repetition codes in data centers
Published 2016“…Hence, a practical solution for node failures is presented by using a self-designed genetic algorithm that searches within the feasible solution space. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
109
-
110
Wind, Solar, and Photovoltaic Renewable Energy Systems with and without Energy Storage Optimization: A Survey of Advanced Machine Learning and Deep Learning Techniques
Published 2022“…This paper covered the most resent and important researchers in the domain of renewable problems using the learning-based methods. Various types of Deep Learning (DL) and Machine Learning (ML) algorithms employed in Solar and Wind energy supplies are given. …”
Get full text
-
111
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
Published 2023“…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …”
-
112
-
113
-
114
-
115
-
116
Design of adaptive arrays based on element position perturbations
Published 1993“…The authors report on the design of a digital feedback control system to provide null steering by controlling the array element positions automatically. …”
Get full text
Get full text
article -
117
The automation of the development of classification models and improvement of model quality using feature engineering techniques
Published 2023“…We demonstrated the applicability of feature engineering techniques such as data imputation, transformation (e.g., scaling, centering, etc.), and data balancing using several case studies and the proposed semi-automated framework. …”
-
118
A parallel search tree algorithm for vertex cover on graphical processing units. (c2013)
Published 2013Get full text
Get full text
masterThesis -
119
-
120
Detecting sleep outside the clinic using wearable heart rate devices
Published 2022“…Personalized yet device-agnostic algorithms can sidestep laborious human annotations and objectify cross-cohort comparisons. …”