Search alternatives:
processing algorithm » processing algorithms (Expand Search)
new algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search)
elements new » elements _ (Expand Search), elementi per (Expand Search)
processing algorithm » processing algorithms (Expand Search)
new algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search)
elements new » elements _ (Expand Search), elementi per (Expand Search)
-
201
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
Published 2022“…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. …”
-
202
Energy-aware adaptive compression for mobile devices. (c2009)
Published 2009Get full text
Get full text
masterThesis -
203
Using artificial bee colony to optimize software quality estimation models. (c2015)
Published 2016“…We validate our technique on data describing maintainability and reliability of classes in an Object-Oriented system. …”
Get full text
Get full text
masterThesis -
204
-
205
The Generalization of Bidirectional Dual Active Bridge DC/DC Converter Modulation Schemes: State-of-the-Art Analysis under Triple Phase Shift Control
Published 2023“…<p dir="ltr">The main objective of this paper is to provide a thorough analysis of currently used modulation control schemes for single-phase bidirectional dual active bridge DC/DC converters. …”
-
206
Information warfare recovery-fighting back through the matrix. (c2012)
Published 2012Get full text
Get full text
masterThesis -
207
-
208
C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments
Published 2023“…The aim of streaming conformance checking is to find dis crepancies between process executions on streaming data and the refer ence process model. …”
Get full text
Get full text
Get full text
-
209
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
Published 2020“…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …”
-
210
Correlation Clustering with Overlaps
Published 2020“…We present a heuristic algorithm and a semi-exact algorithm for the Multi-Parameterized Cluster Editing with Vertex Splitting problem. …”
Get full text
Get full text
Get full text
masterThesis -
211
Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las...
Published 2020“…In view of this, an innovative signal processing technique called a self-adaptive-smart algorithm (SASA) was designed and developed. …”
Get full text
-
212
A combined resource allocation framework for PEVs charging stations, renewable energy resources and distributed energy storage systems
Published 2017“…The formulation is decomposed into two interdependent sub-problems and solved using a combination of metaheuristic and deterministic optimization techniques. A sample case study is presented to illustrate the performance of the algorithm.…”
Get full text
article -
213
Stability improvement of the PSS-connected power system network with ensemble machine learning tool
Published 2022“…The first system is a single-machine infinite bus power system, while the second is a unified power flow controller (UPFC) device. The backtracking search algorithm (BSA) based proposed ensemble model is formed by combining three machine learning (ML) techniques, namely the extreme learning machine (ELM), neurogenetic (NG) system, and multi-gene genetic programming (MGGP). …”
-
214
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
Published 2024“…Researchers are also developing various techniques for detecting and analyzing <u>mobile malware</u> to overcome these issues. As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. …”
-
215
Defining quantitative rules for identifying influential researchers: Insights from mathematics domain
Published 2024“…Within each categorical grouping, we meticulously selected the five most pivotal parameters. This selection process was guided by an importance score, that was derived after assessing its influence on the model's performance in the classification of data pertaining to both awardees and non awardees. …”
-
216
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
Published 2024“…<p dir="ltr">Most companies nowadays are using digital platforms for the recruitment of new employees to make the hiring process easier. The rapid increase in the use of online platforms for job posting has resulted in fraudulent advertising. …”
-
217
Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn...
Published 2020“…A special consideration was given to data pre-processing and dimensionality reduction such Chi Squared (CS) and Recursive Feature Elimination (RFE) to improve progressively the proposed models performance. …”
Get full text
-
218
Peak Loads Shaving in a Team of Cooperating Smart Buildings Powered Solar PV-Based Microgrids
Published 2021“…The algorithm has been tested through a case study to demonstrate its performance and effectiveness.…”
-
219
Modeling and Identification of Nonlinear DC Motor Drive Systems Using Recurrent Wavelet Networks
Published 2013Get full text
doctoralThesis -
220
Investigation of Forming a Framework to shortlist contractors in the tendering phase
Published 2022“…After obtaining the weights of the decision factors, a model using Machine Learning algorithm on Google Colab was written using the Python language. …”
Get full text