Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
mean algorithm » deer algorithm (Expand Search), search algorithm (Expand Search)
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
mean algorithm » deer algorithm (Expand Search), search algorithm (Expand Search)
-
201
Power system output feedback stabilizer design via geneticalgorithms
Published 1997“…The paper demonstrates the use of genetic algorithms to design output feedback power system stabilizers. …”
Get full text
Get full text
article -
202
A Novel Partitioned Random Forest Method-Based Facial Emotion Recognition
Published 2025“…Using three statistical measures Lyapunov exponents (LE), Correlation Dimension (CD), and approximate entropy (AE), we evaluated the performance of machine learning algorithms over different data lengths. …”
-
203
Self-Checking Hardware Design for Montgomery Exponentiation-Based Cryptography
Published 2024“…<p dir="ltr">Montgomery exponentiation is widely used for public-key-based cryptography systems. The current state-of-the-art designs for this algorithm are well-analyzed in terms of hardware overhead but are not investigated for faults caused by physical attacks. …”
-
204
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
Published 2021“…Its security has been verified formally using Random Oracle Model (ROM), ProVerif2.02 and informally using assumptions and pragmatic illustration. …”
-
205
Humanizing AI in medical training: ethical framework for responsible design
Published 2023“…Humanizing AI in medical training is crucial to ensure that the design and deployment of its algorithms align with ethical principles and promote equitable healthcare outcomes for both medical practitioners trainees and patients. …”
-
206
-
207
-
208
-
209
Stochastic management of hybrid AC/DC microgrids considering electric vehicles charging demands
Published 2020“…A novel evolving solution based on flower pollination algorithm is also proposed to solve the problem optimally. …”
Get full text
Get full text
Get full text
article -
210
Methods for system-on-chip test design, scheduling and optimization. (c2006)
Published 2006Get full text
Get full text
masterThesis -
211
-
212
Hardware design and VLSI implementation of a byte-wise CRCgenerator chip
Published 1995“…The byte-wise CRC algorithm is translated to hardware and pressed in APHL (VLSI design automation language). …”
Get full text
Get full text
article -
213
-
214
-
215
KNNOR: An oversampling technique for imbalanced datasets
Published 2021“…The proposed technique called K-Nearest Neighbor OveRsampling approach (KNNOR) performs a three step process to identify the critical and safe areas for augmentation and generate synthetic data points of the minority class. …”
-
216
Machine Learning-Driven Prediction of Corrosion Inhibitor Efficiency: Emerging Algorithms, Challenges, and Future Outlooks
Published 2025“…At the same time, virtual sample augmentation and genetic algorithm feature selection elevate sparse data performance, raising k-nearest neighbor models from R<sup>2</sup> = 0.05 to 0.99 in a representative thiophene set. …”
-
217
-
218
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
Published 2023“…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …”
-
219
Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images
Published 2022“…Over the decade, numerous artificial neural network (ANN)-based techniques were adopted in order to diagnose and classify breast cancer due to the unique characteristics of learning key features from complex data via a training process. However, these schemes have limitations like slow convergence and longer training time. …”
-
220