Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
each algorithm » search algorithm (Expand Search), jaya algorithm (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
each algorithm » search algorithm (Expand Search), jaya algorithm (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
-
141
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
Published 2024“…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …”
-
142
A Clinically Interpretable Approach for Early Detection of Autism Using Machine Learning With Explainable AI
Published 2025“…After handling missing values, balancing the dataset, and analyzing the classifier’s performance, it is found that tree-based algorithms, particularly RF, perform better for all the datasets. …”
-
143
Morphology for Planar Hexagonal Modular Self-Reconfigurable Robotic Systems
Published 2009Get full text
doctoralThesis -
144
-
145
-
146
Localization of Damages in Plain And Riveted Aluminium Specimens using Lamb Waves
Published 2018“…The presence of a faulty rivet is indicated by the inflation in amplitude of the second harmonic. A new algorithm is therefore proposed by the authors to localize the faulty rivet, using the spectral content information. …”
Get full text
-
147
Information warfare. (c2015)
Published 2015“…In addition, we will implement the algorithm and compare its performance to other detection and recovery algorithms.…”
Get full text
Get full text
masterThesis -
148
Developing a framework for using face recognition in transit payment transactions
Published 2021“…This solution considers an effective cost-based solution. The second solution is proposed based on implementing a dedicated full HD face recognition stereo camera system on top of each metro gate and integrate it with the recommended “Banking Payment Context- Account Based Ticketing System” by using the MFcoface face recognition method which results from the systematic literature review and experts’ outcomes. …”
Get full text
-
149
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
Get full text
Get full text
Get full text
article -
150
Turbo-charging dominating set with an FPT subroutine
Published 2017“…Turbo-charging is a recent algorithmic technique that is based on the fixed-parameter tractability of the dynamic versions of some problems as a way to improve heuristics. …”
Get full text
Get full text
Get full text
conferenceObject -
151
Assigning proctors to exams using scatter search. (c2006)
Published 2006Get full text
Get full text
masterThesis -
152
How much is location information worth?
Published 2018“…We then derive the worst-case ratio of our algorithm and show that it is best-possible in two contexts - the first, one in which the amount of time between the disclosure events and release time are fixed and equal for all jobs; and a second in which the time between disclosure events varies for each job. …”
Get full text
Get full text
Get full text
conferenceObject -
153
Uplink Noma in UAV-Assisted IoT Networks
Published 2022“…The second device is then selected using a heuristic algorithm based on prioritizing devices with higher bit rate requirements and strict deadlines. …”
Get full text
Get full text
Get full text
masterThesis -
154
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
-
155
Complexity Avoidance using Biological Resemblance of Modular Multivariable Structure
Published 2014“…Combination of Fuzzy logic and Genetic Algorithm is becoming popular among researchers in the field. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
156
-
157
Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring
Published 2020“…However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. …”
-
158
Methods for system-on-chip test design, scheduling and optimization. (c2006)
Published 2006Get full text
Get full text
masterThesis -
159
A Blockchain Model for Secure Communications in Internet of Vehicles
Published 2021“…The simulation results demonstrated the good performance of the HPBC algorithm when implemented within the IoV environment.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
160
A pragmatic approach for testing robustness on real-time component based systems
Published 2005“…In the first phase, the tester tests the robustness of each component in isolation. If all components are robust according to the inserted hazards, in the second phase, we use the nominal and degraded specification of the whole system to check the robustness of communications between components.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject