Search alternatives:
making algorithm » cosine algorithm (Expand Search)
means algorithm » search algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
data making » data mining (Expand Search)
making algorithm » cosine algorithm (Expand Search)
means algorithm » search algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
data making » data mining (Expand Search)
-
121
A forward-backward Kalman for the estimation of time-variant channels in OFDM
Published 2005“…In this paper, we propose an expectation-maximization (EM) algorithm for joint channel and data recovery. The algorithm makes use of the rich structure of the underlying communication problem-a structure induced by the data and channel constraints. …”
Get full text
Get full text
article -
122
Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model
Published 2024“…The proposed approach of DDN is trained with proper data sequences used for communication and the training phase is conducted with the norms of numerous channel variants. …”
-
123
Recovery of business intelligence systems
Published 2018“…The efficiency of the data recovery algorithm is substantial for e-healthcare systems. …”
Get full text
Get full text
Get full text
Get full text
article -
124
An EM-Based Forward-Backward Kalman Filter for the Estimation of Time-Variant Channels in OFDM
Published 0000“…The algorithm makes a collective use of the data and channel constraints inherent in the communication problem. …”
Get full text
Get full text
article -
125
An Ontology-based Semantic Web for Arabic Question Answering: The Case of E-Government Services
Published 2018“…Further, 414 automatic questions are tested on the QA algorithm using two methods, semantics-based and keyword-based. …”
Get full text
-
126
Vehicular-OBUs-As-On-Demand-Fogs
Published 2020“…For instance, real-time vehicular applications require fast processing of the vast amount of generated data by vehicles in order to maintain service availability and reachability while driving. …”
Get full text
Get full text
Get full text
Get full text
article -
127
A Biologicaly Inspired Decision Model for Multivariable Genetic- Fuzzy-AHP System
Published 2016“…The proposed GFT mechanism can be applied to any decision making problem within an uncertain environment. One example would be the determination of CRM performance measurement given a variety of inputs related to marketing, data mining tools, ordered materials and communication.…”
Get full text
Get full text
Get full text
Get full text
article -
128
A hybrid approach for XML similarity
Published 2007“…In the past few years, XML has been established as an effective means for information management, and has been widely exploited for complex data representation. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
129
Real-Time Path-Planning using Depth/INS Sensor Fusion for Localization
Published 2019Get full text
doctoralThesis -
130
Future Prediction of COVID-19 Vaccine Trends Using a Voting Classifier
Published 2021“…Multiple ML algorithms are used to improve decision-making at different aspects after forecasting. …”
-
131
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
132
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…The Internet of Things (IoT) platform allows physical devices to connect directly to the internet and upload data continuously. Insecure access makes IoT platforms vulnerable to different network intrusion attacks. …”
Get full text
Get full text
Get full text
article -
133
Nonlinear analysis of shell structures using image processing and machine learning
Published 2023“…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …”
-
134
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…<p>The Internet of Things (IoT) platform allows physical devices to connect directly to the internet and upload data continuously. Insecure access makes IoT platforms vulnerable to different network intrusion attacks. …”
-
135
Growing hierarchical self-organizing map for filtering intrusion detection alarms
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
136
Design and analysis of entropy-constrained reflected residual vector quantization
Published 2002“…Jointly optimized RVQ (JORVQ) is an effective design algorithm for minimizing the overall quantization error. …”
Get full text
Get full text
article -
137
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
Published 2021“…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …”
-
138
Role of authentication factors in Fin-tech mobile transaction security
Published 2023“…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…”
-
139
Improving Rule Set Based Software Quality Prediction
Published 2003Get full text
Get full text
article -
140
The use of semantic-based predicates implication to improve horizontal multimedia database fragmentation
Published 2007“…We particularly discuss multimedia primary horizontal fragmentation and focus on semantic-based textual predicates implication required as a pre-process in current fragmentation algorithms in order to partition multimedia data efficiently. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject