Search alternatives:
method algorithm » mould algorithm (Expand Search)
deer algorithm » search algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
elements deer » elementi per (Expand Search)
method algorithm » mould algorithm (Expand Search)
deer algorithm » search algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
elements deer » elementi per (Expand Search)
-
501
CubeSat Communication Subsystems: A Review of On-Board Transceiver Architectures, Protocols, and Performance
Published 2023“…Nevertheless, several directions for improvements are proposed such as the use of improved channel coding algorithms, Field Programmable Gate Arrays (FPGAs), beamforming, advanced antennas, deployable solar panels, and transition to higher frequency bands. …”
-
502
-
503
Artificial Intelligence for Skin Cancer Detection: Scoping Review
Published 2021“…Hence, to aid in diagnosing skin cancer, artificial intelligence (AI) tools are being used, including shallow and deep machine learning–based methodologies that are trained to detect and classify skin cancer using computer algorithms and deep neural networks.…”
-
504
Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates
Published 2022“…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …”
-
505
Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images
Published 2023“…Considering these shortcomings, computational methods especially machine learning and deep learning algorithms are leveraged as an alternative to accelerate the accurate detection of CT scans as cancerous, and non-cancerous. …”
-
506
Convergence of Photovoltaic Power Forecasting and Deep Learning: State-of-Art Review
Published 2021“…This review article taxonomically dives into the nitty-gritty of the mainstream DL-based PVPF methods while showcasing their strengths and weaknesses. …”
-
507
Crown Structures for Vertex Cover Kernelization
Published 2007“…Crown structures in a graph are defined and shown to be useful in kernelization algorithms for the classic vertex cover problem. Two vertex cover kernelization methods are discussed. …”
Get full text
Get full text
Get full text
article -
508
Identification of phantom movements with an ensemble learning approach
Published 2022“…The ensemble learning-based approaches outperformed the SVM, Decision tree, and kNN methods. …”
-
509
The Role of Machine Learning in Diagnosing Bipolar Disorder: Scoping Review
Published 2021“…We identified different machine learning models used in the selected studies, including classification models (18, 55%), regression models (5, 16%), model-based clustering methods (2, 6%), natural language processing (1, 3%), clustering algorithms (1, 3%), and deep learning–based models (3, 9%). …”
-
510
Comparative Study on Arabic Text Classification: Challenges and Opportunities
Published 2022“…Based on the reviewed researches, SVM and Naive Bayes were the most widely used classifiers for Arabic text classification, while more effort is needed to develop and to implement flexible Arabic text classification methods and classifiers.…”
Get full text
-
511
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…Our solution first transforms the XML document collection (offline) and the keyword query (on-the-fly) into meaningful semantic representations using context-based and global disambiguation methods, specially designed to allow almost linear computation efficiency. …”
Get full text
Get full text
Get full text
Get full text
article -
512
Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks
Published 2024“…We highlight the transition from traditional signature-based to anomaly-based detection methods, emphasizing the significant advantages of AI-driven approaches in identifying novel and sophisticated intrusions. …”
-
513
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
Published 2021“…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …”
Get full text
-
514
Radar Pulse Interleaving For Multi-Target Tracking
Published 2020“…In this paper, we present new tight 0-1 integer programming models for the radar pulse interleaving problem and develop effective solution methods based on Lagrangian relaxation techniques.…”
Get full text
article -
515
-
516
Multi-Agent Meta Reinforcement Learning for Reliable and Low-Latency Distributed Inference in Resource-Constrained UAV Swarms
Published 2025“…Our approach is tested on CNN networks and benchmarked against state-of-the-art conventional reinforcement learning algorithms. Extensive simulations show that our model outperforms competitive methods by around 29% in terms of latency and around 23% in terms of transmission power improvements while delivering results comparable to the traditional LDTP optimization solution by around 9% in terms of latency.…”
-
517
Unsupervised outlier detection in multidimensional data
Published 2022“…The proposed techniques are based on statistical methods considering data compactness and other properties. …”
-
518
Analysis of control strategies for smoothing of solar PV fluctuations with storage devices
Published 2023“…The paper aims to analyze the ramp-rate and step-rate control methods for smoothing solar PV fluctuations based on the irradiation profiles in a DC microgrid (MG) environment. …”
-
519
Arabic text recognition
Published 2004“…Thus, the need to attempt a research related to Arabic handwritten text recognition. Algorithms based on neural networks have proved to give better results than conventional methods when applied to problems where the decision rules of the classification problem are not clearly defined. …”
Get full text
Get full text
Get full text
article -
520
A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques
Published 2022“…Amongst the range of classification algorithms, support vector machines (SVMs) are heavily utilised for detecting phishing emails. …”
Get full text
Get full text