Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
testing algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
data testing » data using (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
testing algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
data testing » data using (Expand Search)
-
61
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
Published 2022“…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
-
62
Using Machine Learning Algorithms to Forecast Solar Energy Power Output
Published 2025“…We focused on the first 30-min, 3-h, 6-h, 12-h, and 24-h windows to gain an appreciation of the impact of forecasting duration on the accuracy of prediction using the selected machine learning algorithms. The study results show that Random Forest outperformed all other tested algorithms. …”
-
63
A Graph Heuristic Approach for the Data Path Allocation Problem
Published 2022Get full text
Get full text
Get full text
masterThesis -
64
Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn...
Published 2020“…LR with the reduced feature set using the intersection between CS and RFE proved to be the best model among the tested algorithms. This model can be used in a clinical setting as a decision support system or for public health awareness as an informal risk prediction system. …”
Get full text
-
65
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
66
Multi-Objective Optimisation of Injection Moulding Process for Dashboard Using Genetic Algorithm and Type-2 Fuzzy Neural Network
Published 2024“…Computational techniques, like the finite element method, are used to analyse behaviours based on varied input parameters. …”
-
67
The Detection of Dysarthria Severity Levels Using AI Models: A Review
Published 2024Subjects: “…artificial intelligence (AI)-based models…”
-
68
L-2 Gap-Metric-Based Identification Algorithms For Linear Feedback Systems
Published 2020Get full text
article -
69
NOVEL STACKING CLASSIFICATION AND PREDICTION ALGORITHM BASED AMBIENT ASSISTED LIVING FOR ELDERLY
Published 2022“…Therefore, this thesis proposed a Novel Stacking Classification and Prediction (NSCP) algorithm based on AAL for the older people with Multi-strategy Combination based Feature Selection (MCFS) and Novel Clustering Aggregation (NCA) algorithms. …”
Get full text
-
70
Bird’s Eye View feature selection for high-dimensional data
Published 2023“…This approach is inspired by the natural world, where a bird searches for important features in a sparse dataset, similar to how a bird search for sustenance in a sprawling jungle. BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …”
-
71
Test time minimization for system-on-chip with test bus assignment and sizin
Published 2017“…Test access mechanism (TAM) is responsible for test data transport and is characterized by its bandwidth capacity. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
72
-
73
Real-Time Implementation of High Performance Control Scheme for Grid-Tied PV System for Power Quality Enhancement Based on MPPC-SVM Optimized by PSO Algorithm
Published 2018“…<p dir="ltr">This paper proposes a high performance control scheme for a double function grid-tied double-stage PV system. It is based on model predictive power control with space vector modulation. …”
-
74
AI and IoT-based concrete column base cover localization and degradation detection algorithm using deep learning techniques
Published 2023“…This paper proposes a novel automated algorithm for the health monitoring of concrete column base cover degradation based on IoT and the state-of-the-art deep learning framework, Convolutional Neural Network (CNN). …”
Get full text
Get full text
Get full text
article -
75
Methodology for Analyzing the Traditional Algorithms Performance of User Reviews Using Machine Learning Techniques
Published 2020“…In this research, different machine-learning algorithms such as logistic regression, random forest and naïve Bayes were tuned and tested. …”
-
76
Matheuristic Fixed Set Search Applied to the Two-Stage Capacitated Facility Location Problem
Published 2025Subjects: -
77
Efficient Approximate Conformance Checking Using Trie Data Structures
Published 2021“…In this paper, we contribute a new formulation of the proxy behavior derived from a model for approximate conformance checking. By encoding the proxy behavior using a trie data structure, we obtain a logarithmically reduced search space for alignment computation compared to a set-based representation. …”
Get full text
Get full text
Get full text
-
78
-
79
A cluster-based model for QoS-OLSR protocol
Published 2017“…Four cluster-based models are derived. Simulation results show that the novel cluster-based QoS-OLSR model, based on energy and bandwidth metrics, can efficiently prolong the network lifetime, ensure QoS and decrease delay.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
80