Showing 61 - 80 results of 105 for search '(( elements network algorithm ) OR ((( data code algorithm ) OR ( may settings algorithm ))))', query time: 0.12s Refine Results
  1. 61

    A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security by Shitharth Selvarajan (14157976)

    Published 2024
    “…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …”
  2. 62

    Downlink channel estimation for IMT-DS by Faisal, S.

    Published 2001
    “…IMT-DS system is an approved terrestrial radio interface standard for 3G mobile communication based on direct sequence code division multiple access (DS-CDMA). It employs a RAKE receiver to exploit multipath diversity. …”
    Get full text
    Get full text
    article
  3. 63
  4. 64

    Making progress with the automation of systematic reviews: principles of the International Collaboration for the Automation of Systematic Reviews (ICASR) by Elaine Beller (44602)

    Published 2018
    “…Fortunately, many tasks of systematic reviews have the potential to be automated or may be assisted by automation. Recent advances in natural language processing, text mining and machine learning have produced new algorithms that can accurately mimic human endeavour in systematic review activity, faster and more cheaply. …”
  5. 65

    Dynamic multiple node failure recovery in distributed storage systems by Itani, May

    Published 2018
    “…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  6. 66
  7. 67

    Multidimensional Gains for Stochastic Approximation by Saab, Samer S.

    Published 2019
    “…Necessary and sufficient conditions for M≥ N algorithms are presented pertaining to algorithm stability and convergence of the estimate error covariance matrix. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  8. 68
  9. 69

    Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model by Ramesh Sundar (19326046)

    Published 2024
    “…The proposed approach of DDN is trained with proper data sequences used for communication and the training phase is conducted with the norms of numerous channel variants. …”
  10. 70

    Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases by Muhammad Ali Muzammil (17910611)

    Published 2024
    “…Potentially disregarded age-related ECG variations may result from skewed age data in training sets. …”
  11. 71

    Towards a Unified Arabic Government Services Chatbot Based on Ontology by Areed, Sufyan

    Published 2020
    “…The feasibility of the proposed algorithm has been proven through executing multiple experimental tests for the same set of questions (414 questions) that were performed on the ontology earlier, then it has been compared with the ontology itself and the formal chatbot that has been designed by Smart Dubai Government (Rashid) chatbot. …”
    Get full text
  12. 72
  13. 73
  14. 74

    Benchmarking Concept Drift Detectors for Online Machine Learning by Mahgoub, Mahmoud

    Published 2022
    “…The main task is to detect changes in data distribution that might cause changes in the decision bound aries for a classification algorithm. Upon drift detection, the classifica tion algorithm may reset its model or concurrently grow a new learning model. …”
    Get full text
    Get full text
    Get full text
  15. 75
  16. 76

    Design and analysis of entropy-constrained reflected residual vector quantization by Mousa, W.A.H.

    Published 2002
    “…Jointly optimized RVQ (JORVQ) is an effective design algorithm for minimizing the overall quantization error. …”
    Get full text
    Get full text
    article
  17. 77

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD by Saeed Ullah Jan (9079260)

    Published 2021
    “…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …”
  18. 78

    Teachers' Perceptions of the Role of Artificial Intelligence in Facilitating Inclusive Practices for Students with Special Educational Needs and Disabilities: A Case Study in a Pri... by BACHIR, HIBAH AHMAD

    Published 2025
    “…The significance of this research stems from its focus on a rarely explored context providing valuable insights into how AI can be leveraged to enhance inclusive education in similar educational settings. Finally, various factors posed limitations to the study, including the small sample size, the focus on a single private school, and relying entirely on semi-structured interviews, this, in turn, may limit the generalizability of findings.…”
    Get full text
  19. 79

    Role of authentication factors in Fin-tech mobile transaction security by Habib Ullah Khan (12024579)

    Published 2023
    “…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…”
  20. 80

    Computer-aided detection of Melanoma using geometric features by Azar, Danielle

    Published 2017
    “…An accuracy of 89% was obtained on the testing set. The results indicate that this technique may be used to detect Melanoma skin cancer.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject