Search alternatives:
sampling algorithm » scheduling algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
sampling algorithm » scheduling algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
-
121
IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture
Published 2025“…The IoMT sector deals with valuable, confidential healthcare-related data and offers convenient, personalized healthcare services. …”
-
122
-
123
Information warfare recovery-fighting back through the matrix. (c2012)
Published 2012Get full text
Get full text
masterThesis -
124
-
125
A synchronous/asynchronous multi-master replication method. (c2007)
Published 2007Get full text
Get full text
masterThesis -
126
Building power consumption datasets: Survey, taxonomy and future directions
Published 2020“…Accordingly, a novel visualization strategy based on using power consumption micro-moments has been presented along with an example of deploying machine learning algorithms to classify the micro-moment classes and identify anomalous power usage.…”
-
127
-
128
Single channel speech denoising by DDPG reinforcement learning agent
Published 2025“…In this paper, a novel SD algorithm is presented based on the deep deterministic policy gradient (DDPG) agent; an off-policy reinforcement learning (RL) agent with a continuous action space. …”
-
129
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
Published 2020“…However, high dimensional data present a significant challenge for machine learning techniques. …”
-
130
Correlation Clustering with Overlaps
Published 2020“…We present a heuristic algorithm and a semi-exact algorithm for the Multi-Parameterized Cluster Editing with Vertex Splitting problem. …”
Get full text
Get full text
Get full text
masterThesis -
131
Artificial Intelligence for the Prediction and Early Diagnosis of Pancreatic Cancer: Scoping Review
Published 2023“…A higher level of accuracy (99%) was found in studies that used support vector machine, decision trees, and k-means clustering algorithms. </p><h3>Conclusions </h3><p dir="ltr">This review presents an overview of studies based on AI models and algorithms used to predict and diagnose pancreatic cancer patients. …”
-
132
-
133
A hybrid cryptosystem based on WEP for 802.11 networks. (c2006)
Published 2006Get full text
Get full text
masterThesis -
134
R-CONV++: uncovering privacy vulnerabilities through analytical gradient inversion attacks
Published 2025“…The first algorithm presents a novel data leakage method that efficiently exploits convolutional layer gradients, demonstrating that even with non-fully invertible activation functions, such as ReLU, training samples can be analytically reconstructed directly from gradients without the need to reconstruct intermediate layer outputs. …”
-
135
Digital twin in energy industry: Proposed robust digital twin for power plant and other complex capital-intensive large engineering systems
Published 2022“…Data-driven algorithms with capabilities to predict the system’s dynamic behavior still need to be developed. …”
-
136
Information warfare. (c2015)
Published 2015“…Numerous damage assessment and recovery algorithms have been proposed by researchers. In this work we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
Get full text
Get full text
masterThesis -
137
-
138
-
139
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…<p dir="ltr">The Internet of Things (IoT) is extensively used in modern-day life, such as in smart homes, intelligent transportation, etc. However, the present security measures cannot fully protect the IoT due to its vulnerability to malicious assaults. …”
-
140
An Alternating Projection Framework for Elementwise Masked Nonlinear Matrix Decomposition
Published 2025Get full text
doctoralThesis