Search alternatives:
processing algorithm » processing algorithms (Expand Search)
working algorithms » learning algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
processing algorithm » processing algorithms (Expand Search)
working algorithms » learning algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
-
101
-
102
Design of adaptive arrays based on element position perturbations
Published 1993“…The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …”
Get full text
Get full text
article -
103
Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE
Published 2020“…The novel LSTM time series algorithm proved to work best for demand forecasting. …”
Get full text
-
104
Topics in graph algorithms
Published 2003“…This is achieved by implementing some algorithms for the vertex cover problem, and conducting experiments on real data sets. …”
Get full text
Get full text
Get full text
masterThesis -
105
The Use of Microwave Tomography in Bone Healing Monitoring
Published 2019Get full text
doctoralThesis -
106
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
Published 2022“…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. …”
-
107
Energy-aware adaptive compression for mobile devices. (c2009)
Published 2009Get full text
Get full text
masterThesis -
108
-
109
-
110
-
111
Distributed Tree-Based Machine Learning for Short-Term Load Forecasting With Apache Spark
Published 2021“…The paper proposes a concurrent job scheduling algorithm in a multi-energy data source environment using Apache Spark. …”
-
112
Information warfare recovery-fighting back through the matrix. (c2012)
Published 2012Get full text
Get full text
masterThesis -
113
-
114
Practical Multiple Node Failure Recovery in Distributed Storage Systems
Published 2016Get full text
Get full text
Get full text
Get full text
conferenceObject -
115
-
116
-
117
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
Published 2022“…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
-
118
-
119
Severity-Based Prioritized Processing of Packets with Application in VANETs
Published 2019“…Also, the proposed heuristic is tested against a non-prioritized processing algorithm that works using first come first served policy. …”
-
120
Automatic and Intelligent Stressor Identification Based on Photoplethysmography Analysis
Published 2021“…In particular, this study proposes a novel algorithm that first detects instances of stress and then classifies the stressor type using photoplethysmography (PPG) data from wearable smartwatches. …”