Search alternatives:
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
per algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
element per » elementi per (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
per algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
element per » elementi per (Expand Search)
-
161
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
Published 2023“…Moreover, the Reconciliate Multi-Agent Markov Learning (RMML) based classification algorithm is used to predict the intrusion with its appropriate classes. …”
-
162
Digital twin in energy industry: Proposed robust digital twin for power plant and other complex capital-intensive large engineering systems
Published 2022“…Furthermore, this paper demonstrates the advantages of the developed ADL algorithm approach and DSM prediction of the DT using vector autoregressive model for anomaly detection in utility gas turbines with data from an operational power plant.…”
-
163
Downlink channel estimation for IMT-DS
Published 2001“…IMT-DS system is an approved terrestrial radio interface standard for 3G mobile communication based on direct sequence code division multiple access (DS-CDMA). …”
Get full text
Get full text
article -
164
Analysis of Using Machine Learning to Enhance the Efficiency of Facilities Management in the UAE
Published 2022“…Seasonal thresholds are set for sensor values, and the algorithm detects hazardous trends when values exceed safe limits, correlating them with related sensors to generate combined variables and error codes. …”
Get full text
-
165
On the complexity of multi-parameterized cluster editing
Published 2017“…In other words, Cluster Editing can be solved efficiently when the number of false positives/negatives per single data element is expected to be small compared to the minimum cluster size. …”
Get full text
Get full text
Get full text
Get full text
article -
166
Impact Of Multidisciplinary Maternal Resuscitation Training Program on Improving the Front-Line Care Provider’s Readiness to Manage Maternal Cardiac Arrest: A Pre-test/Post-test St...
Published 2024“…The multidisciplinary resuscitation teams were observed during the cardiac arrest mock drills both before and after conducting the multidisciplinary resuscitation simulation-based training program and the introduction of the maternal resuscitation algorithm pathway against seven KPIs. Those KPIs were Time to Confirm Cardiac Arrest; Code Blue and /or Code White Activation Time; Time to attempt first chest compression; Defibrillator Arrival Time; Time to First Defibrillation shock; Code blue/code white arrival time and Time to perform Perimortem Caesarean Delivery.…”
-
167
Information warfare. (c2015)
Published 2015“…Numerous damage assessment and recovery algorithms have been proposed by researchers. In this work we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
Get full text
Get full text
masterThesis -
168
Improving INS/GPS Integration for Mobile Robotics Applications
Published 2008Get full text
doctoralThesis -
169
Enhanced DC Microgrid Protection: a Neural Network and Wavelet Transform Approach
Published 2024Get full text
doctoralThesis -
170
Information warfare
Published 2017“…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
Get full text
Get full text
Get full text
Get full text
article -
171
Computation of conformal invariants
Published 2020“…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …”
Get full text
Get full text
Get full text
article -
172
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
Get full text
Get full text
Get full text
article -
173
Computation of conformal invariants
Published 2021“…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …”
-
174
CEAP
Published 2016“…Simulation results show that our model is able to increase the accuracy of detections, enhance the attack detection rate, decrease the false positive rate, and improve the packet delivery ratio in the presence of high mobility compared to the classical SVM-based, Dempster–Shafer-based, and averaging-based detection techniques.…”
Get full text
Get full text
Get full text
Get full text
article -
175
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
-
176
-
177
Developing an online hate classifier for multiple social media platforms
Published 2020“…Although researchers have found that hate is a problem across multiple platforms, there is a lack of models for online hate detection using multi-platform data. To address this research gap, we collect a total of 197,566 comments from four platforms: YouTube, Reddit, Wikipedia, and Twitter, with 80% of the comments labeled as non-hateful and the remaining 20% labeled as hateful. …”
-
178
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security
Published 2024“…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …”
-
179
Recovery of business intelligence systems
Published 2018“…Reducing the execution time of recovery is the key target of our algorithm. The proposed algorithm outperforms the existing algorithm. …”
Get full text
Get full text
Get full text
Get full text
article -
180
HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP
Published 2020“…In this paper the ahrdware design and VLSi implementation of a byte-wise CRC generator is presented. The algorithm is based on the work presented in [10] in which a software implementation was proposed. …”
Get full text
article