Search alternatives:
method algorithm » mould algorithm (Expand Search)
making algorithm » cosine algorithm (Expand Search)
data making » data mining (Expand Search)
method algorithm » mould algorithm (Expand Search)
making algorithm » cosine algorithm (Expand Search)
data making » data mining (Expand Search)
-
281
Isolating Physical Replacement of Identical IoT Devices Using Machine and Deep Learning Approaches
Published 2021Get full text
doctoralThesis -
282
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
Published 2023“…In this system, a combination of unique and intelligent mechanisms are implemented to ensure the security of smart city networks. It includes QIDI for data filtering, CSOM for feature optimization and dimensionality reduction, and RMML for categorizing the type of intrusion. …”
-
283
-
284
Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations
Published 2007“…This paper presents the design and implementation of an elliptic curve cryptographic core to realize point scalar multiplication operations used for the GF(p) elliptic curve encryption/decryption and the elliptic curve digital signature algorithm (ECDSA). The design makes use of projective coordinates together with scalable Montgomery multipliers for data size of up to 256-bits. …”
Get full text
Get full text
article -
285
A Fusion-Based Approach for Skin Cancer Detection Combining Clinical Images, Dermoscopic Images, and Metadata
Published 2025Get full text
doctoralThesis -
286
A Framework for Predictive Modeling in Sustainable Projects
Published 2012Get full text
doctoralThesis -
287
Video features with impact on user quality of experience
Published 2021Get full text
Get full text
Get full text
Get full text
conferenceObject -
288
Vibration suppression in a cantilever beam using a string-type vibration absorber
Published 2017“…The string is rigidly connected to the fixed end of the beam and through a spring and damper to a second point on the beam. The finite element method is used to model the system and a reduced order model is obtained through modal reduction performed on both the string and the beam. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
289
Applications of fast fourier transform in the integrity evaluation of deep foundations
Published 2016“…The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …”
Get full text
Get full text
Get full text
Get full text
article -
290
-
291
Scheduling and allocation in high-level synthesis using stochastic techniques
Published 2020“…Both genetic scheduling and allocation (GSA) and tabu scheduling and allocation (TSA) have been tested on various benchmarks and results obtained for data-oriented control-data flow graphs are compared with other implementations in the literature. …”
Get full text
article -
292
Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials
Published 1997“…Performance evaluation of the proposed methods and comparisons with existing methods are made by means of Monte-Carlo simulations, experimental data and analysis. The first scheme makes use of the complex cepstrum of the third-order cumulants (complex bicepstrum) of the ultrasonic signals. …”
Get full text
masterThesis -
293
Privacy-preserving energy optimization via multi-stage federated learning for micro-moment recommendations
Published 2025“…<p>Human behavior significantly impacts domestic energy consumption, making it essential to monitor and improve these consumption patterns. …”
-
294
Modelling Exchange Rates during Currency Crisis using Neural Networks
Published 2006Get full text
Get full text
Get full text
conferenceObject -
295
A novel few shot learning derived architecture for long-term HbA1c prediction
Published 2024“…For the first time in the literature, this work proposes a novel FSL-derived algorithm for the long-term prediction of clinical HbA1c measures. …”
-
296
-
297
-
298
Using machine learning to support students’ academic decisions
Published 2019“…This approach uses other students’ grades to make a prediction. This research tests and compares the performance of Decision Trees, Random Forests, Gradient-Boosted trees, and Deep Learning machine learning regression algorithms to predict student GPA. …”
Get full text
-
299
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
Published 2021“…Both GPS and UAVN/FANET use open network channels for data broadcasting, which are exposed to several threats, thus making security risky and challenging. …”
-
300
Wearable Artificial Intelligence for Anxiety and Depression: Scoping Review
Published 2023“…The most frequently used data set from open sources was Depresjon. The most commonly used algorithm was random forest, followed by support vector machine.…”