Showing 201 - 220 results of 348 for search '(( elementi rd algorithm ) OR ((( data code algorithm ) OR ( based testing algorithm ))))*', query time: 0.14s Refine Results
  1. 201

    New Dimensions for Physical Layer Secret Key Generation: Excursion Lengths-Based Key Generation by Muhammad Adil (4899082)

    Published 2024
    “…The practical PLSKG algorithms (level-crossing algorithms) extract a secret key by analyzing the channel samples and assigning bit sequences to the channel samples lying in different quantization regions. …”
  2. 202

    Logic-based Benders decomposition combined with column generation for mobile 3D printer scheduling problem by Tao Li (86810)

    Published 2025
    “…After analyzing the characteristics and structure of the model, a logic-based Benders decomposition algorithm framework is designed for solving this problem. …”
  3. 203

    Cognitive Load Estimation Using a Hybrid Cluster-Based Unsupervised Machine Learning Technique by Iqbal Hassan (22155274)

    Published 2024
    “…In this study, we harnessed the capabilities of a four-channel, wearable EEG device that captured brain activity data during two distinct CL states: Baseline (representing a non-CL, resting state) and the Stroop Test (a CL-inducing state). The primary objective of this study is to estimate the CL index through an innovative approach that employs a hybrid, cluster-based, unsupervised learning technique seamlessly integrated with a 1D Convolutional Neural Network (CNN) architecture tailored for automated feature extraction, rather than conventional supervised algorithms, which facilitated in the acquisition of latent complex patterns without the need for manual categorization. …”
  4. 204

    Integrated whole transcriptome and small RNA analysis revealed multiple regulatory networks in colorectal cancer by Hibah Shaath (5599658)

    Published 2021
    “…Additionally, potential interaction between differentially expressed lncRNAs such as H19, SNHG5, and GATA2-AS1 with multiple miRNAs has been revealed. Taken together, our data provides thorough analysis of dysregulated protein-coding and non-coding RNAs in CRC highlighting numerous associations and regulatory networks thus providing better understanding of CRC.…”
  5. 205

    Robust Kalman filter and smoother for errors-in-variables model with observation outliers based on Least-Trimmed-Squares by ALMutawa, Jaafar

    Published 2020
    “…As a result, a new statistical test to check the existence of outliers which is based on the Kalman filter and smoother has been formulated. …”
    Get full text
    article
  6. 206

    Peak Loads Shaving in a Team of Cooperating Smart Buildings Powered Solar PV-Based Microgrids by Ahmed Ouammi (14151039)

    Published 2021
    “…The algorithm has been tested through a case study to demonstrate its performance and effectiveness.…”
  7. 207

    Integration of nonparametric fuzzy classification with an evolutionary-developmental framework to perform music sentiment-based analysis and composition by Abboud, Ralph

    Published 2019
    “…In this paper, we introduce a new algorithmic framework for autonomous music sentiment-based expression and composition, titled MUSEC, that perceives an extensible set of six primary human emotions (e.g., anger, fear, joy, love, sadness, and surprise) expressed by a MIDI musical file and then composes (creates) new polyphonic (pseudo) thematic, and diversified musical pieces that express these emotions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  8. 208
  9. 209

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …”
    Get full text
  10. 210
  11. 211

    Enhancing Breast Cancer Diagnosis With Bidirectional Recurrent Neural Networks: A Novel Approach for Histopathological Image Multi-Classification by Rajendra Babu Chikkala (22330876)

    Published 2025
    “…The BRNN model, refined using the Adagrad optimization algorithm, efficiently integrates the learned features from both branches. …”
  12. 212
  13. 213

    Day-Ahead Load Demand Forecasting in Urban Community Cluster Microgrids Using Machine Learning Methods by Sivakavi Naga Venkata Bramareswara Rao (15944992)

    Published 2022
    “…The effectiveness of these optimization algorithms is verified in terms of training, test, validation, and error analysis. …”
  14. 214
  15. 215

    Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval by Mohammed Tahar Habib Kaib (21633176)

    Published 2024
    “…The proposed algorithm has been tested on three tank system pilot plant and Ain El Kebira Cement rotary kiln process. …”
  16. 216

    Wavelet Analysis- Singular Value Decomposition Based Method for Precise Fault Localization in Power Distribution Networks Using k-NN Classifier by Abhishek Raj (7245425)

    Published 2025
    “…The WA-SVD leverages the slime mould algorithm (SMA) and graph theory (GT) in enhancing the overall accuracy of fault localization. …”
  17. 217
  18. 218

    A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security by S. Shitharth (12017480)

    Published 2023
    “…Moreover, the Reconciliate Multi-Agent Markov Learning (RMML) based classification algorithm is used to predict the intrusion with its appropriate classes. …”
  19. 219

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment by Zakaria Tolba (16904718)

    Published 2022
    “…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
  20. 220

    Wide area monitoring system operations in modern power grids: A median regression function-based state estimation approach towards cyber attacks by Haris M. Khalid (17017743)

    Published 2023
    “…The algorithm was stationed at each monitoring node using interacting multiple model (IMM)-based fusion architecture. …”