Search alternatives:
could algorithm » mould algorithm (Expand Search), carlo algorithm (Expand Search), colony algorithm (Expand Search)
element » elements (Expand Search)
could algorithm » mould algorithm (Expand Search), carlo algorithm (Expand Search), colony algorithm (Expand Search)
element » elements (Expand Search)
-
121
Parallel Algorithms for Distinguishing Nondeterministic Finite State Machines
Published 2015Get full text
doctoralThesis -
122
An improved quorum selection algorithm (IQSA). (c2007)
Published 2007Get full text
Get full text
masterThesis -
123
-
124
Data reductions and combinatorial bounds for improved approximation algorithms
Published 2016“…Kernelization algorithms in the context of Parameterized Complexity are often based on a combination of data reduction rules and combinatorial insights. …”
Get full text
Get full text
Get full text
Get full text
article -
125
Data redundancy management for leaf-edges in connected environments
Published 2022“…Although the sensed data could be useful for various applications (e.g., event detection in cities, energy management in commercial buildings), it first requires pre-processing to clean various inconsistencies (e.g., anomalies, redundancies, missing values). …”
Get full text
Get full text
Get full text
Get full text
article -
126
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
Published 2024“…IoT devices share, collect, and exchange data via the internet, wireless networks, or other networks with one another. …”
-
127
Information warfare. (c2015)
Published 2015“…While preventive measures could be overcome and detection measures could detect an attack late after damage has occurred, there is a need for a recovery algorithm that will recover the database to its correct state before the attack has taken place. …”
Get full text
Get full text
masterThesis -
128
An Effective Fault Diagnosis Technique for Wind Energy Conversion Systems Based on an Improved Particle Swarm Optimization
Published 2022“…First, an efficient feature selection algorithm based on particle swarm optimization (PSO) is proposed. …”
-
129
-
130
Improving the security of SNMP in wireless networks
Published 2017“…Simple network management protocol (SNMP) is widely used for monitoring and managing computers and network devices on wired and wireless network. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
131
Parallel physical optimization algorithms for allocating data to multicomputer nodes
Published 1994“…They are based on simulated annealing, neural networks and genetic algorithms. …”
Get full text
Get full text
Get full text
article -
132
Physical optimization algorithms for mapping data to distributed-memory multiprocessors
Published 1992“…We also present a technique for efficient mapping of large data sets. The algorithms include a parallel genetic algorithm (PGA), a parallel neural network algorithm (PNN) and a parallel simulated annealing algorithm (PSA). …”
Get full text
Get full text
Get full text
masterThesis -
133
Modulation With Metaheuristic Approach for Cascaded-MPUC49 Asymmetrical Inverter With Boosted Output
Published 2020“…For the calculation of optimum angles, a meta-heuristic based Genetic Algorithm (GA) technique is employed. …”
-
134
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
Published 2010“…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
Get full text
-
135
Wearable wrist to finger photoplethysmogram translation through restoration using super operational neural networks based 1D-CycleGAN for enhancing cardiovascular monitoring
Published 2024“…TTR-GAN comprises cascaded dual-stage 1D Cycle Generative Adversarial Networks (1D-CycleGANs) constructed using Super-ONNs. …”
-
136
-
137
The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions
Published 2022“…The advantages, limitations, and use-cases for each algorithm are provided. We then conduct a comprehensive and in-depth literature review and classify existing related works based on both the radio resources they are addressing and the type of wireless networks they are investigating. …”
-
138
Cryptocurrency Exchange Market Prediction and Analysis Using Data Mining and Artificial Intelligence
Published 2020“…One of the best algorithms in terms of the result is the Long Short Term Memory (LSTM) since it is based on recurrent neural networks which uses loop as a method to learn from heuristics data. …”
Get full text
-
139
Unsupervised Deep Learning for Classification Of Bats Calls Using Acoustic Data
Published 2021Get full text
doctoralThesis -
140
Cross entropy error function in neural networks
Published 2002“…The cross entropy function is proven to accelerate the backpropagation algorithm and to provide good overall network performance with relatively short stagnation periods. …”
Get full text
Get full text
Get full text
conferenceObject