Search alternatives:
making algorithm » cosine algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
per algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
elements per » elementi per (Expand Search), elements _ (Expand Search)
making algorithm » cosine algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
per algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
elements per » elementi per (Expand Search), elements _ (Expand Search)
-
141
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
-
142
Real-Time Path-Planning using Depth/INS Sensor Fusion for Localization
Published 2019Get full text
doctoralThesis -
143
Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring
Published 2020“…However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. …”
-
144
Design and analysis of entropy-constrained reflected residual vector quantization
Published 2002“…Jointly optimized RVQ (JORVQ) is an effective design algorithm for minimizing the overall quantization error. …”
Get full text
Get full text
article -
145
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
Published 2021“…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …”
-
146
Role of authentication factors in Fin-tech mobile transaction security
Published 2023“…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…”
-
147
A hybrid neuro-fuzzy power system stabilizer for multimachine powersystems
Published 1998“…The proposed FBFN is trained over a wide range of operating conditions in order to re-tune the PSS parameters in real-time based on machine loading conditions. The orthogonal least squares (OLS) learning algorithm is developed for designing an adequate and parsimonious FBFN model. …”
Get full text
Get full text
article -
148
Collision-Free Autonomous Navigation Solution for Mobile Wheeled
Published 2023Get full text
doctoralThesis -
149
-
150
Information warfare recovery-fighting back through the matrix. (c2012)
Published 2012Get full text
Get full text
masterThesis -
151
Measuring ripple effect for object-oriented programs. (c2004)
Published 2004Get full text
Get full text
masterThesis -
152
Growing hierarchical self-organizing map for filtering intrusion detection alarms
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
153
Social Network Analysis for Precise Friend Suggestion for Twitter by Associating Multiple Networks Using ML
Published 2022“…<p dir="ltr">The main aim in this paper is to create a friend suggestion algorithm that can be used to recommend new friends to a user on Twitter when their existing friends and other details are given. …”
-
154
Using artificial bee colony to optimize software quality estimation models. (c2015)
Published 2016“…We build our model using machine learning techniques in particular rule-based models. These have a white-box nature which gives the classification as well as the reason for it making them attractive to experts in the domain. …”
Get full text
Get full text
masterThesis -
155
A comprehensive review of deep reinforcement learning applications from centralized power generation to modern energy internet frameworks
Published 2025“…We present a structured taxonomy covering value-based, policy-based, actor-critic, model-based, and advanced multi-agent and multi-objective approaches, and link algorithms to tasks such as dispatch, microgrid coordination, real-time pricing, load balancing, and demand–response. …”
-
156
Recent advances on artificial intelligence and learning techniques in cognitive radio networks
Published 2015“…The literature survey is organized based on different artificial intelligence techniques such as fuzzy logic, genetic algorithms, neural networks, game theory, reinforcement learning, support vector machine, case-based reasoning, entropy, Bayesian, Markov model, multi-agent systems, and artificial bee colony algorithm. …”
Get full text
Get full text
Get full text
Get full text
article -
157
Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images
Published 2023“…Moreover, it is faster and requires fewer parameters to train than other CNN based models, making it a good choice for large-scale deployment in clinical settings and a promising tool for automated lung cancer diagnosis from CT scan images.…”
-
158
DeepRaman: Implementing surface-enhanced Raman scattering together with cutting-edge machine learning for the differentiation and classification of bacterial endotoxins
Published 2025“…This method offers precise endotoxin classification and holds significant potential for expedited medical diagnoses and therapeutic decision-making in cases of pathogenic infections. ConclusionWe present the effectiveness of DeepRaman, an innovative architecture inspired by the Progressive Fourier Transform and integrated with the scalogram transformation method, in classifying raw SERS Raman spectral data from biological specimens with unparalleled accuracy relative to conventional machine learning algorithms. …”
Get full text
Get full text
Get full text
article -
159
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
160
Using machine learning to support students’ academic decisions
Published 2019“…This approach uses other students’ grades to make a prediction. This research tests and compares the performance of Decision Trees, Random Forests, Gradient-Boosted trees, and Deep Learning machine learning regression algorithms to predict student GPA. …”
Get full text