Search alternatives:
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
-
61
-
62
-
63
-
64
-
65
-
66
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Published 2022“…To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …”
-
67
Improving Rule Set Based Software Quality Prediction
Published 2003Get full text
Get full text
article -
68
Simultaneous identification of robust synergistic subnetwork markers for effective cancer prognosis
Published 2014“…The proposed method utilizes an efficient message-passing algorithm called affinity propagation, based on which we identify groups – or subnetworks – of discriminative and synergistic genes, whose protein products are closely located in the protein-protein interaction (PPI) network. …”
-
69
-
70
-
71
Machine Learning-Based Approach for EV Charging Behavior
Published 2021Get full text
doctoralThesis -
72
Improved Dwarf Mongoose Optimization for Constrained Engineering Design Problems
Published 2022“…This optimization technique modifies the base algorithm (DMO) in three simple but effective ways. …”
Get full text
-
73
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
Published 2022“…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. In this paper, we proposed a novel technique in steganography within the digital images such is RGB, Gray Scale, Texture, Aerial images to achieve higher security, imperceptibility, capacity, and robustness as compared with existing methods. …”
-
74
Analysis of Multi-User-Based UAV System With Outdated CSI
Published 2024“…The impact of decode-and-forward (DF) based relaying and outdated channel state information is assessed at the receiver nodes. …”
-
75
RRT and Octomap based 3D environment exploration and mapping
Published 2020Get full text
doctoralThesis -
76
DRL-Based IRS-Assisted Secure Visible Light Communications
Published 2022“…The DDPG-based algorithm provides an optimized solution that can adapt to the large size of design parameters and act fast to the channel variations due to users’ mobility. …”
-
77
Practical Multiple Node Failure Recovery in Distributed Storage Systems
Published 2016“…The fractional repetition (FR) code is a class of regenerating codes that consists of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
78
A Hybrid Deep Learning Model Using CNN and K-Mean Clustering for Energy Efficient Modelling in Mobile EdgeIoT
Published 2023“…The proposed method, existing weighted clustering algorithm (WCA), and agent-based secure enhanced performance approach (AB-SEP) are tested over the network dataset. …”
-
79
On-site workshop investment problem: A novel mathematical approach and solution procedure
Published 2023“…Next, due to the NP-hardness of the problem, an enhanced Genetic Algorithm (GA)-based metaheuristic with efficient problem-specific improvement rules as local search and effective crossover and mutation operators is proposed. …”
-
80
FPGA-based Parallel Hardware Architecture for Real-time Object Classification
Published 2014Get full text
doctoralThesis