Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
-
81
Anomaly Detection Based Framework for Profile Monitoring
Published 2023Get full text
doctoralThesis -
82
-
83
Deepfakes Signatures Detection in the Handcrafted Features Space
Published 2023“…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
Get full text
-
84
Creating and detecting fake reviews of online products
Published 2022“…Using the better model, GPT-2, we create a dataset for a classification task of fake review detection. …”
-
85
A Hybrid Fault Detection and Diagnosis of Grid-Tied PV Systems: Enhanced Random Forest Classifier Using Data Reduction and Interval-Valued Representation
Published 2021“…In the proposed FDD approach, named interval reduced kernel PCA (IRKPCA)-based Random Forest (IRKPCA-RF), the feature extraction and selection phase is performed using the IRKPCA models while the fault classification is ensured using the RF algorithm. …”
-
86
Spectrum Sensing Algorithms for Cooperative Cognitive Radio Networks
Published 2010Get full text
doctoralThesis -
87
-
88
IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture
Published 2025“…The IoMT manufacturers need to offer their products at a competitive price, which forces them to use simplified architecture, leaving limited and, to some extent, no scope to employ sophisticated cybersecurity algorithms. …”
-
89
Artificial Intelligence for Skin Cancer Detection: Scoping Review
Published 2021“…Hence, to aid in diagnosing skin cancer, artificial intelligence (AI) tools are being used, including shallow and deep machine learning–based methodologies that are trained to detect and classify skin cancer using computer algorithms and deep neural networks.…”
-
90
-
91
An Effective Hash Based Assessment and Recovery Algorithm for Healthcare Systems
Published 2019Get full text
Get full text
Get full text
masterThesis -
92
Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval
Published 2024“…<p dir="ltr">Fault detection and diagnosis (FDD) systems play a crucial role in maintaining the adequate execution of the monitored process. …”
-
93
Modified arithmetic optimization algorithm for drones measurements and tracks assignment problem
Published 2023“…The measurements and track generation are simulated using Stone Soup software. On the other hand, the optimization of the problem is implemented using several evolutionary-based metaheuristic algorithms. …”
Get full text
-
94
Evolutionary algorithms for state justification in sequential automatic test pattern generation
Published 2005“…Sequential circuit test generation using deterministic, fault-oriented algorithms is highly complex and time consuming. …”
Get full text
article -
95
-
96
Generation and Detection of Sign Language Deepfakes - A Linguistic and Visual Analysis
Published 2025“…We also apply machine learning algorithms to establish a baseline for deepfake detection on this dataset, contributing to the detection of fraudulent sign language videos.…”
Get full text
article -
97
PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits
Published 2022“…Implications are that toxicity trigger detection algorithms can leverage generic approaches but must also tailor detections to specific communities.…”
-
98
Growing hierarchical self-organizing map for filtering intrusion detection alarms
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
99
XBeGene: Scalable XML Documents Generator by Example Based on Real Data
Published 2012“…Inspired by the query-by-example paradigm in information retrieval, Our generator system i)allows the user to provide her own sample XML documents as input, ii) analyzes the structure, occurrence frequencies, and content distributions for each XML element in the user input documents, and iii) produces synthetic XML documents which closely concur, in both structural and content features, to the user's input data. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
100
A decoding algorithm for I-Q space-time coded systems in fadingenvironments
Published 2000“…Therefore, a simplified decoding algorithm is proposed. It is based on symbol-by-symbol detection of the Q/I components in the I/Q decoders. …”
Get full text
Get full text
article