Search alternatives:
processing algorithm » processing algorithms (Expand Search)
base algorithm » jaya algorithm (Expand Search), cosine algorithm (Expand Search)
search » research (Expand Search)
processing algorithm » processing algorithms (Expand Search)
base algorithm » jaya algorithm (Expand Search), cosine algorithm (Expand Search)
search » research (Expand Search)
-
441
CEAP
Published 2016“…Simulation results show that our model is able to increase the accuracy of detections, enhance the attack detection rate, decrease the false positive rate, and improve the packet delivery ratio in the presence of high mobility compared to the classical SVM-based, Dempster–Shafer-based, and averaging-based detection techniques.…”
Get full text
Get full text
Get full text
Get full text
article -
442
Decision-level Gait Fusion for Human Identification at a Distance
Published 2014Get full text
doctoralThesis -
443
Tracking and repairing damaged healthcare databases using the matrix
Published 2015“…The algorithm is based on data dependency and uses a single matrix. …”
Get full text
Get full text
Get full text
Get full text
article -
444
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
Published 2019“…Therefore, for this paper multiple machine learning algorithms are investigated to predict system failure based on vehicle trips information as well as maintenance management historical data including preventive maintenance and corrective maintenance. …”
Get full text
-
445
Modeling and Guidance of an Underactuated Autonomous Underwater Vehicle
Published 2017Get full text
doctoralThesis -
446
MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks
Published 2009“…This paper introduces a message forwarding algorithm for search applications within mobile ad hoc networks that is based on the concept of selecting the nearest node from a set of designated nodes. …”
Get full text
Get full text
Get full text
Get full text
article -
447
Optimizing ADWIN for Steady Streams
Published 2022“…However, online machine learning comes with many challenges for the different aspects of the learning process, starting from the algorithm design to the evaluation method. …”
Get full text
Get full text
Get full text
-
448
Integrative toxicogenomics: Advancing precision medicine and toxicology through artificial intelligence and OMICs technology
Published 2023“…As personalized medicine and toxicogenomics involve huge data processing, AI can expedite this process by providing powerful data processing, analysis, and interpretation algorithms. …”
-
449
SemIndex: Semantic-Aware Inverted Index
Published 2017“…We provide here a new approach, called SemIndex, that extends the standard inverted index by constructing a tight coupling inverted index graph that combines two main resources: a general purpose semantic network, and a standard inverted index on a collection of textual data. We also provide an extended query model and related processing algorithms with the help of SemIndex. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
450
Evacuation of a highly congested urban city
Published 2017“…As the evacuation route planning is computationally challenging, an evacuation scheduling algorithm was adopted to expedite the solution process. …”
Get full text
Get full text
Get full text
conferenceObject -
451
Scatter search for homology modeling
Published 2016“…However this technique suffers from poor initial target-template alignments. To improve homology based PSP, we propose a scatter search (SS) metaheuristic algorithm. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
452
A Framework for Predictive Modeling in Sustainable Projects
Published 2012Get full text
doctoralThesis -
453
Information Warfare
Published 2015“…The algorithm is based on data dependency and uses a single matrix that will be later used during recovery.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
454
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
Published 2010“…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
Get full text
-
455
DeepRaman: Implementing surface-enhanced Raman scattering together with cutting-edge machine learning for the differentiation and classification of bacterial endotoxins
Published 2025“…ConclusionWe present the effectiveness of DeepRaman, an innovative architecture inspired by the Progressive Fourier Transform and integrated with the scalogram transformation method, in classifying raw SERS Raman spectral data from biological specimens with unparalleled accuracy relative to conventional machine learning algorithms. …”
Get full text
Get full text
Get full text
article -
456
Detecting and Predicting Archaeological Sites Using Remote Sensing and Machine Learning—Application to the Saruq Al-Hadid Site, Dubai, UAE
Published 2023“…The modelling and prediction accuracies are expected to improve with the insertion of a neural network and backpropagation algorithms based on the performed cluster groups following more recent field surveys. …”
Get full text
-
457
DASSI: differential architecture search for splice identification from DNA sequences
Published 2022“…The demand for robust algorithms over the recent years has brought huge success in the field of Deep Learning (DL) in solving many difficult tasks in image, speech and natural language processing by automating the manual process of architecture design. …”
-
458
High-order parametrization of the hypergeometric-Meijer approximants
Published 2023“…<p>In this work, we introduce an extension to the hypergeometric algorithm we developed before for the resummation of divergent series.The extension overcome the time-consuming problem we face in the parametrization process of the hypergeometric approximants. …”
-
459
Information warfare
Published 2017“…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
Get full text
Get full text
Get full text
Get full text
article -
460
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …”
Get full text
Get full text
Get full text
article