Search alternatives:
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
recent studies » events studies (Expand Search)
level using » level fusion (Expand Search)
element » elements (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
recent studies » events studies (Expand Search)
level using » level fusion (Expand Search)
element » elements (Expand Search)
-
161
Use data Mining Techniques to Predict Users’ Engagement on the Social Network Posts in The Period Before, During and After Ramadan
Published 2017“…Social media has become ubiquitous and main requirement for individuals lives, its used for socialization sharing information and recently for marketing and advertising. …”
Get full text
-
162
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
Published 2022“…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. …”
-
163
QU-GM: An IoT Based Glucose Monitoring System From Photoplethysmography, Blood Pressure, and Demographic Data Using Machine Learning
Published 2024“…Bagged Ensemble Trees outperform other algorithms in estimating blood glucose level with a correlation coefficient of 0.90. …”
-
164
Smart non-intrusive appliance identification using a novel local power histogramming descriptor with an improved k-nearest neighbors classifier
Published 2021“…Specifically, short local histograms are drawn to represent individual appliance consumption signatures and robustly extract appliance-level data from the aggregated power signal. Furthermore, an improved k-nearest neighbors (IKNN) algorithm is presented to reduce the learning computation time and improve the classification performance. …”
-
165
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…The novelty of this work is, a recently developed DRF optimization methodology incorporated with the machine learning algorithm is utilized for maximizing the security level of IoT systems. …”
-
166
State-of-Charge Estimation Using Triple Forgetting Factor Adaptive Extended Kalman Filter for Battery Energy Storage Systems in Electric Bus Applications
Published 2025“…The performance of the proposed TFF-AEKF is evaluated and compared to the conventional adaptive extended Kalman filter (AEKF) and the dual forgetting factor AEKF (DFF-AEKF), considering low and high measurement noise levels. It has been validated that the proposed algorithm can provide faster convergence and better accuracy when considering a high measurement noise level. …”
-
167
Tailoring motivational health messages for smoking cessation using an mHealth recommender system integrated with an electronic health record: a study protocol
Published 2018“…Patients’ feedback on the messages and their interactions with the app will be analyzed and evaluated following an observational prospective methodology to a) assess the perceived quality of the mobile-based health recommender system and the messages, using the precision and time-to-read metrics and an 18-item questionnaire delivered to all patients who complete the program, and b) measure patient engagement with the mobile-based health recommender system using aggregated data analytic metrics like session frequency and, to determine the individual-level engagement, the rate of read messages for each user. …”
-
168
Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model
Published 2024“…The performance level improvements are practically summarized in both the transmission and reception entities with the help of the proposed hybrid network architecture and the associated Dual Deep Network algorithm. …”
-
169
Deep Learning-Based Short-Term Load Forecasting Approach in Smart Grid With Clustering and Consumption Pattern Recognition
Published 2021“…<p>Different aggregation levels of the electric grid's big data can be helpful to develop highly accurate deep learning models for Short-term Load Forecasting (STLF) in electrical networks. …”
-
170
-
171
Spatially-Distributed Missions With Heterogeneous Multi-Robot Teams
Published 2021“…Both combine a generic MILP solver and a genetic algorithm, resulting in efficient anytime algorithms. …”
-
172
-
173
Analyzing the Influence of Climate and Anthropogenic Development on Vegetation Cover in the Coastal Ecosystems of GCC
Published 2025“…We used Landsat satellite imagery and a Random Forest classification algorithm to map various land cover classes along the GCC coastline. …”
-
174
Corona power loss computation in bundled bipolar conductors
Published 2000“…In this paper, a finite element (FE) based algorithm devoted for the computation of the corona current and hence the corona power loss associated with bundled bipolar high voltage direct current (HVDC) conductors is presented. …”
Get full text
Get full text
article -
175
Newton-Raphson based adaptive inverse control scheme for tracking of nonlinear dynamic plants
Published 2006“…The U-model is utilized to design an adaptive inverse controller by using a simple root-solving algorithm of Newton-Raphson. The synergy of U-model with AIC structure has provided an effective and straight forward method for adaptive tracking of nonlinear plants. …”
Get full text
Get full text
article -
176
Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles
Published 2000“…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …”
Get full text
Get full text
Get full text
article -
177
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
Published 2022“…Further, As the quality of received signals differs at different sensing points as a result of the surface conditions of the specimen, the Self Adaptive Smart Algorithm (SASA) method was adopted to filter out the noise and accurately pinpoint the defect reflected wave packet which ultimately aids in better detection and localization. …”
Get full text
-
178
Improving Active Resonance Damping and Unbalanced Voltage Mitigation Based on Combined DDSRF and Washout Filter in Islanded Microgrids
Published 2024“…Finally, Level 4 integrates a controller based on extracting positive and negative sequence components using the dual decoupled synchronous reference frame (DDSRF) algorithm. …”
-
179
Multi-Model Investigation and Adaptive Estimation of the Acoustic Release of a Model Drug From Liposomes
Published 2019“…Then, the algorithm was used to process the five experimental datasets. …”
Get full text
article -
180
R-CONV++: uncovering privacy vulnerabilities through analytical gradient inversion attacks
Published 2025“…<p dir="ltr">Federated learning has emerged as a prominent privacy-preserving technique for leveraging large-scale distributed datasets by sharing gradients instead of raw data. However, recent studies indicate that private training data can still be exposed through gradient inversion attacks. …”