Showing 241 - 260 results of 365 for search 'based ((selection algorithm) OR (detection algorithm))', query time: 0.07s Refine Results
  1. 241

    A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security by S. Shitharth (12017480)

    Published 2023
    “…Then, the Conjugate Self-Organizing Migration (CSOM) optimization algorithm is deployed to select the most relevant features to train the classifier, which also supports increased detection accuracy. …”
  2. 242

    Blue collar laborers’ travel pattern recognition: Machine learning classifier approach by Aya Hasan Alkhereibi (17151070)

    Published 2021
    “…Raw data preprocessing and outliers detection and filtering algorithms were applied at the first stage of the analysis, and consequently, an activity-based travel matrix was developed for each household. …”
  3. 243

    Digital twin in energy industry: Proposed robust digital twin for power plant and other complex capital-intensive large engineering systems by Ahmad K. Sleiti (14778229)

    Published 2022
    “…Furthermore, this paper demonstrates the advantages of the developed ADL algorithm approach and DSM prediction of the DT using vector autoregressive model for anomaly detection in utility gas turbines with data from an operational power plant.…”
  4. 244

    A novel hybrid methodology for fault diagnosis of wind energy conversion systems by Khaled Dhibi (16891524)

    Published 2023
    “…Therefore, a hybrid feature selection based diagnosis technique, that can preserve the advantages of wrapper and filter algorithms as well as RF model, is proposed. …”
  5. 245
  6. 246

    An Infrastructure-Assisted Crowdsensing Approach for On-Demand Traffic Condition Estimation by Abdul Rahman, Sawsan

    Published 2019
    “…Our approach combines the strengths of mobile crowdsensing, with the support of the mobile infrastructure, a multi-criteria algorithm for the participants' selection, and a deductive rule-based model for traffic condition estimation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 247

    Information warfare. (c2015) by Sai, Mohamed El

    Published 2015
    “…Numerous damage assessment and recovery algorithms have been proposed by researchers. In this work we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
    Get full text
    Get full text
    masterThesis
  8. 248
  9. 249

    Information warfare by Haraty, Ramzi A.

    Published 2017
    “…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 250
  11. 251
  12. 252
  13. 253

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura, Habiba

    Published 2023
    “…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
    Get full text
    Get full text
    Get full text
    article
  14. 254

    The Role of Artificial Intelligence in Decoding Speech from EEG Signals: A Scoping Review by Uzair Shah (15740699)

    Published 2022
    “…We searched six electronic databases: PubMed, IEEE Xplore, the ACM Digital Library, Scopus, arXiv, and Google Scholar. We carefully selected search terms based on target intervention (i.e., imagined speech and AI) and target data (EEG signals), and some of the search terms were derived from previous reviews. …”
  15. 255

    CEAP by Abdel Wahab, Omar

    Published 2016
    “…Simulation results show that our model is able to increase the accuracy of detections, enhance the attack detection rate, decrease the false positive rate, and improve the packet delivery ratio in the presence of high mobility compared to the classical SVM-based, Dempster–Shafer-based, and averaging-based detection techniques.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  16. 256

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura Habiba (17808302)

    Published 2023
    “…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
  17. 257
  18. 258

    Recovery of business intelligence systems by Haraty, Ramzi A.

    Published 2018
    “…Reducing the execution time of recovery is the key target of our algorithm. The proposed algorithm outperforms the existing algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  19. 259

    Power system output feedback stabilizer design via geneticalgorithms by Abdel-Magid, Y.L.

    Published 1997
    “…A digital simulation of the power system is then used in conjunction with the genetic algorithm to determine the output feedback gains. In the second method, the problem of selecting the output feedback gains is converted to a simple optimization problem with an eigenvalue based objective function, which is solved by a genetic algorithm. …”
    Get full text
    Get full text
    article
  20. 260

    HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP by Sait, Sadiq M.

    Published 2020
    “…In this paper the ahrdware design and VLSi implementation of a byte-wise CRC generator is presented. The algorithm is based on the work presented in [10] in which a software implementation was proposed. …”
    Get full text
    article