Search alternatives:
method algorithm » mould algorithm (Expand Search)
per algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
element per » elementi per (Expand Search)
method algorithm » mould algorithm (Expand Search)
per algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
element per » elementi per (Expand Search)
-
681
Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images
Published 2023“…Considering these shortcomings, computational methods especially machine learning and deep learning algorithms are leveraged as an alternative to accelerate the accurate detection of CT scans as cancerous, and non-cancerous. …”
-
682
Convergence of Photovoltaic Power Forecasting and Deep Learning: State-of-Art Review
Published 2021“…This review article taxonomically dives into the nitty-gritty of the mainstream DL-based PVPF methods while showcasing their strengths and weaknesses. …”
-
683
Crown Structures for Vertex Cover Kernelization
Published 2007“…Crown structures in a graph are defined and shown to be useful in kernelization algorithms for the classic vertex cover problem. Two vertex cover kernelization methods are discussed. …”
Get full text
Get full text
Get full text
article -
684
Development of a deep learning-based group contribution framework for targeted design of ionic liquids
Published 2024“…This computational framework can expedite and improve the process of finding desirable molecular structures of IL via accurate property predictions in a data-driven manner. …”
-
685
Identification of phantom movements with an ensemble learning approach
Published 2022“…The ensemble learning-based approaches outperformed the SVM, Decision tree, and kNN methods. …”
-
686
Comparative Study on Arabic Text Classification: Challenges and Opportunities
Published 2022“…Based on the reviewed researches, SVM and Naive Bayes were the most widely used classifiers for Arabic text classification, while more effort is needed to develop and to implement flexible Arabic text classification methods and classifiers.…”
Get full text
-
687
Evacuation of a highly congested urban city
Published 2017“…As the evacuation route planning is computationally challenging, an evacuation scheduling algorithm was adopted to expedite the solution process. …”
Get full text
Get full text
Get full text
conferenceObject -
688
Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks
Published 2024“…We highlight the transition from traditional signature-based to anomaly-based detection methods, emphasizing the significant advantages of AI-driven approaches in identifying novel and sophisticated intrusions. …”
-
689
Anonymizing multimedia documents
Published 2016“…We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …”
Get full text
Get full text
Get full text
Get full text
article -
690
-
691
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
Published 2021“…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …”
Get full text
-
692
Uplink Noma in UAV-Assisted IoT Networks
Published 2022“…The first part of the thesis considers the problem of data collection from time-constrained IoT devices through deploying a UAV with uplink NOMA. …”
Get full text
Get full text
Get full text
masterThesis -
693
Radar Pulse Interleaving For Multi-Target Tracking
Published 2020“…In this paper, we present new tight 0-1 integer programming models for the radar pulse interleaving problem and develop effective solution methods based on Lagrangian relaxation techniques.…”
Get full text
article -
694
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
Published 2019“…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …”
-
695
Improving Rule Set Based Software Quality Prediction
Published 2003Get full text
Get full text
article -
696
-
697
Agent-Based Reactive Geographic Routing Protocol for Internet of Vehicles
Published 2023“…The performance evaluation shows significant improvements in terms of query success ratio, data packet delivery, and end-to-end delay while reducing communication interruptions and overhead.…”
Get full text
Get full text
Get full text
Get full text
article -
698
Lagrangian tracking in stochastic fields with application to an ensemble of velocity fields in the Red Sea
Published 2018“…Lagrangian tracking of passive tracers in a stochastic velocity field within a sequential ensemble data assimilation framework is challenging due to the exponential growth in the number of particles. …”
Get full text
Get full text
Get full text
Get full text
article -
699
A Biologicaly Inspired Decision Model for Multivariable Genetic- Fuzzy-AHP System
Published 2016“…This paper describes a hybridized intelligent algorithm as a tuning mechanism for one type of Genetic Fuzzy system termed the Genetic Fuzzimetric Technique (GFT). …”
Get full text
Get full text
Get full text
Get full text
article -
700