Search alternatives:
method algorithm » mould algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
element » elements (Expand Search)
method algorithm » mould algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
element » elements (Expand Search)
-
281
Enhanced climate change resilience on wheat anther morphology using optimized deep learning techniques
Published 2024“…Various Deep Learning algorithms, including Convolution Neural Network (CNN), LeNet, and Inception-V3 are implemented to classify the records and extract various patterns. …”
-
282
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
Published 2024“…According to the latest available statistics, in 2023, there were approximately 17.2 billion connected IoT devices; this is expected to reach 25.4 billion IoT devices by 2030 and grow year over year for the foreseeable future. …”
-
283
Common weaving approach in mainstream languages for software security hardening
Published 2013“…We handle the correctness and the completeness of GIMPLE weaving in two different ways. In the first approach, we prove them according to the rules and algorithms provided in this paper. …”
Get full text
Get full text
Get full text
article -
284
Advancing Coherent Power Grid Partitioning: A Review Embracing Machine and Deep Learning
Published 2025“…This paper provides PS researchers with a bird’s eye view of the current state of mainstream PGP implementations. Additionally, it assists stakeholders in selecting the most appropriate clustering algorithms for PGP applications.…”
-
285
Strategies for Reliable Stress Recognition: A Machine Learning Approach Using Heart Rate Variability Features
Published 2024“…This study employed supervised learning algorithms to classify stress and relaxation states using HRV measures. …”
-
286
The automation of the development of classification models and improvement of model quality using feature engineering techniques
Published 2023“…The proposed framework is extendable and configurable by adding algorithms supported by the CARET package implemented in the R programming language. …”
-
287
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
Published 2021“…The performance evaluation proved that the proposed protocol is lightweight compared to prior protocols and recommended for implementation in the real-world IoD environment.</p><h2>Other Information</h2><p>Published in: IEEE Access<br>License: <a href="https://creativecommons.org/licenses/by/4.0/legalcode" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1109/access.2021.3076692" target="_blank">https://dx.doi.org/10.1109/access.2021.3076692</a></p>…”
-
288
Multimodal feature fusion and ensemble learning for non-intrusive occupancy monitoring using smart meters
Published 2025“…We also demonstrate that eliminating redundant devices during s2s2p learning further enhances occupancy detection. …”
-
289
THE FUTURE OF MEDICINE, healthcare innovation through precision medicine: policy case study of Qatar
Published 2020“…It is here. Implementing PM in routine clinical care does require some investment and infrastructure development. …”
-
290
Enhancing Scalability of Fast Electric Vehicle Charging Stations: Solutions for AC–DC Side Integration and Regulation
Published 2024“…Furthermore, these techniques are implemented using low-cost microcontrollers and validated experimentally through the utilization of three parallel-connected AFRs.…”
-
291
A Cyber-Physical System and Graph-Based Approach for Transportation Management in Smart Cities
Published 2021“…The system makes use of travel-time, traffic intensity, vehicle’s speed, and current road conditions to construct a weighted city graph representing the road network. Traditional graph algorithms with efficient implementation technologies are employed to respond to commuters’ and authorities’ needs in order to achieve a smart and optimum transportation system. …”
-
292
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
Published 2023“…The results that obtained from 2-classes classification showed a superiority of LSTM in terms of accuracy with 95.59%, while the best accuracy in the 6-classes classification gained from implementing CNN with 78.75%. …”
Get full text
-
293
Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases
Published 2024“…The use of AI in cardiology, however, has several limitations and obstacles, despite its potential. The effective implementation of AI-powered ECG analysis is limited by issues such as systematic bias. …”
-
294
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
Published 2021“…The technology stack of the proposed solution was also implemented with four algorithms and eight protocols. …”
Get full text
-
295
ECG Signal Reconstruction on the IoT-Gateway and Efficacy of Compressive Sensing Under Real-Time Constraints
Published 2018“…<p dir="ltr">Remote health monitoring is becoming indispensable, though, Internet of Things (IoTs)-based solutions have many implementation challenges, including energy consumption at the sensing node, and delay and instability due to cloud computing. …”
-
296
Design and Development of a Synergetic Controller for a Permanent Magnet Synchronous Motor Drive System
Published 2017Get full text
doctoralThesis -
297
Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study
Published 2023“…However, despite the significant impact of AI design on human interests, the security and trustworthiness of edge AI applications are not foolproof and ethicalneither foolproof nor ethical; Moreover, social norms are often ignored duringin the design, implementation, and deployment of edge AI systems. In this paper, we make the following two contributions: Firstly, we analyze the application of edge AI through a human-centric perspective. …”
-
298
Enhancing building sustainability: A Digital Twin approach to energy efficiency and occupancy monitoring
Published 2024“…Our data-driven occupancy detection approach utilized Machine Learning (ML) algorithms to intelligently determine room occupancy, allowing for precise energy management based on real-time usage patterns. …”
-
299
Predicting Compression Modes and Split Decisions for HEVC Video Coding Using Machine Learning Techniques
Published 2017Get full text
doctoralThesis -
300
Towards secure and trusted AI in healthcare: A systematic review of emerging innovations and ethical challenges
Published 2025“…Still, challenges in adversarial attacks, algorithmic bias, and variable regulatory frameworks remain strong. …”