Search alternatives:
using technologies » purifying technologies (Expand Search), emerging technologies (Expand Search)
using technologies » purifying technologies (Expand Search), emerging technologies (Expand Search)
-
221
-
222
Anomaly Detection Based Framework for Profile Monitoring
Published 2023Get full text
doctoralThesis -
223
-
224
A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis
Published 2021“…Specifically, we used a clustering algorithm to group published articles based on the similarity of their abstracts to identify research hotspots and current research directions. …”
-
225
The Generalization of Bidirectional Dual Active Bridge DC/DC Converter Modulation Schemes: State-of-the-Art Analysis under Triple Phase Shift Control
Published 2023“…<p dir="ltr">The main objective of this paper is to provide a thorough analysis of currently used modulation control schemes for single-phase bidirectional dual active bridge DC/DC converters. …”
-
226
XBeGene: Scalable XML Documents Generator by Example Based on Real Data
Published 2012Get full text
Get full text
Get full text
Get full text
conferenceObject -
227
-
228
Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study
Published 2023“…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …”
-
229
Real-Time Implementation of GPS Aided Low Cost Strapdown Inertial Navigation System
Published 2009Get full text
doctoralThesis -
230
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
Published 2021“…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…”
-
231
Generation and Detection of Sign Language Deepfakes - A Linguistic and Visual Analysis
Published 2025“…This research explores the positive application of deepfake technology for upper body generation, specifically sign language for the Deaf and Hard of Hearing (DHoH) community. …”
Get full text
article -
232
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
Published 2021“…The optimization phase improved the conceptual framework by adding three new fundamental concepts: hubs coupling, encrypted transmission, and end-to-end service quality. The technology stack was also enhanced with three new algorithms and five protocols. …”
Get full text
-
233
Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators
Published 2021“…DNA microarray technology is the fabrication of a single chip to contain a thousand genetic codes. …”
Get full text
-
234
The role of Reinforcement Learning in software testing
Published 2023“…</p><h3>Results</h3><p dir="ltr">This study highlights different software testing types to which RL has been applied, commonly used RL algorithms and architecture for learning, challenges faced, advantages and disadvantages of using RL, and the performance comparison of RL-based models against other techniques.…”
-
235
-
236
-
237
A Survey of Deep Learning Approaches for the Monitoring and Classification of Seagrass
Published 2025“…The increase in imagery data has in turn created a demand for automated detection and classification using deep neural network-based techniques. This study reviews the current deep-learning techniques used for monitoring and classification of the seagrass. …”
-
238
Accelerating Blockchain Transaction Verification With Parallel Computing
Published 2024Get full text
doctoralThesis -
239
Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases
Published 2024“…To guarantee a safe and successful deployment in clinical practice, the use of AI in cardiology must be done with a thorough understanding of the algorithms and their limits. …”
-
240
An intelligent EPROM silicon compiler
Published 1991“…A knowledge-based kernel determines the chip architecture and required circuit blocks and calls appropriate module generators for each block. Routing algorithms are then used to connect these blocks into a full chip…”
Get full text
Get full text
article