Showing 161 - 180 results of 243 for search '(( element pass algorithm ) OR ((( detection using algorithm ) OR ( neural coding algorithm ))))', query time: 0.10s Refine Results
  1. 161

    Benchmarking Concept Drift Detectors for Online Machine Learning by Mahgoub, Mahmoud

    Published 2022
    “…The main task is to detect changes in data distribution that might cause changes in the decision bound aries for a classification algorithm. …”
    Get full text
    Get full text
    Get full text
  2. 162

    Optimizing ADWIN for Steady Streams by Moharram, Hassan

    Published 2022
    “…Several variants for ADWIN have been proposed to enhance its runtime performance, w.r.t throughput, and latency. However, the drift detection accuracy of these variants was not compared with the original algorithm. …”
    Get full text
    Get full text
    Get full text
  3. 163
  4. 164

    Compensation of axle-generator errors due to wheel slip and slide by Saab, Samer S.

    Published 2002
    “…Experimental results using three different axle encoders aboard a freight train are provided to illustrate the performance of the proposed algorithm…”
    Get full text
    Get full text
    Get full text
    article
  5. 165

    Information warfare. (c2015) by Sai, Mohamed El

    Published 2015
    “…Numerous damage assessment and recovery algorithms have been proposed by researchers. In this work we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
    Get full text
    Get full text
    masterThesis
  6. 166

    A 3-D vision-based man-machine interface for hand-controlled telerobot by Al-Mouhamed, M.A.

    Published 2005
    “…To determine the three-dimensional (3-D) position a tracking algorithm based on uncalibrated cameras with weak perspective projection model is used. …”
    Get full text
    Get full text
    article
  7. 167

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura, Habiba

    Published 2023
    “…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. The performance evaluation using standard datasets demonstrates that the proposed model provides an accuracy of up to 99.99%.…”
    Get full text
    Get full text
    Get full text
    article
  8. 168

    An Effective Fault Diagnosis Technique for Wind Energy Conversion Systems Based on an Improved Particle Swarm Optimization by Majdi Mansouri (16869885)

    Published 2022
    “…The main idea behind the use of the PSO algorithm is to remove irrelevant features and extract only the most significant ones from raw data in order to improve the classification task using a neural networks classifier. …”
  9. 169

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura Habiba (17808302)

    Published 2023
    “…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. The performance evaluation using standard datasets demonstrates that the proposed model provides an accuracy of up to 99.99%.…”
  10. 170

    Information warfare by Haraty, Ramzi A.

    Published 2017
    “…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 171
  12. 172

    Developing an online hate classifier for multiple social media platforms by Joni Salminen (7434770)

    Published 2020
    “…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …”
  13. 173

    A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security by S. Shitharth (12017480)

    Published 2023
    “…Moreover, the Reconciliate Multi-Agent Markov Learning (RMML) based classification algorithm is used to predict the intrusion with its appropriate classes. …”
  14. 174
  15. 175

    Blue collar laborers’ travel pattern recognition: Machine learning classifier approach by Aya Hasan Alkhereibi (17151070)

    Published 2021
    “…Raw data preprocessing and outliers detection and filtering algorithms were applied at the first stage of the analysis, and consequently, an activity-based travel matrix was developed for each household. …”
  16. 176

    HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP by Sait, Sadiq M.

    Published 2020
    “…The number of clocl cycles required to generate and transmitany CRC (for an 8 hour bytemessage) is just two more that the time required to calculate it (in all 10 clocl pulses. The CRC chip can be used in anumber of applications. These include areas such as error detection and correction in data comunication, signature analysis and mass storage devices for parallel information transfers.…”
    Get full text
    article
  17. 177

    Information reconciliation through agent controlled graph model. (c2018) by Saba, Rita

    Published 2018
    “…Thus, the need for a detection and recovery algorithm to assess the damage and bring the database back to its consistent state in case of an attack. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  18. 178

    Recovery of business intelligence systems by Haraty, Ramzi A.

    Published 2018
    “…Reducing the execution time of recovery is the key target of our algorithm. The proposed algorithm outperforms the existing algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  19. 179

    A microscale evaluation of pavement roughness effects for asset management by El Khoury, John

    Published 2013
    “…The results of the study validate the relationship between acceleration/road roughness and fuel consumption. Finally, using the described technology, a pothole detection algorithm is devised to automatically map road roughness, a step towards a better asset management system.…”
    Get full text
    Get full text
    Get full text
    article
  20. 180

    Hardware design and VLSI implementation of a byte-wise CRCgenerator chip by Sait, Sadiq M.

    Published 1995
    “…The number of clock cycles required to generate and transmit any CRC (for an 8 byte message) is just two more than the time required to calculate it (in all 10 clock pulses). The CRC chip can be used in a number of applications. These include areas such as error detection and correction in data communications, signature analysis, and mass storage devices for parallel information transfers…”
    Get full text
    Get full text
    article