-
181
Recovery of business intelligence systems
Published 2018“…The efficiency of the data recovery algorithm is substantial for e-healthcare systems. …”
Get full text
Get full text
Get full text
Get full text
article -
182
Shuffled Linear Regression with Erroneous Observations
Published 2019“…We propose an optimal recursive algorithm that updates the estimate from the underdetermined function that is based on that permutation-invariant constraint. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
183
HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP
Published 2020“…These include areas such as error detection and correction in data comunication, signature analysis and mass storage devices for parallel information transfers.…”
Get full text
article -
184
Modelling Exchange Rates during Currency Crisis using Neural Networks
Published 2006“…The models are built using the feedforward ANN structure trained by the backpropagation algorithm. Exchange rate data from the Lebanese currency crisis period of 1985-1992 is used for training, testing and evaluation of the models. …”
Get full text
Get full text
Get full text
conferenceObject -
185
Design and development of an embedded controller for roboticmanipulator
Published 1998“…MPA is capable of determining a simplified control law by selecting the most dominant terms from a library of nonlinear functions associated with the robot's equations of motion. …”
Get full text
Get full text
article -
186
CEAP
Published 2016“…We propose as well a propagation algorithm that disseminates only the final decisions (instead of the whole dataset) among clusters with the aim of reducing the overhead of either exchanging results between each set of vehicles or repeating the detection steps for the already detected malicious vehicles. …”
Get full text
Get full text
Get full text
Get full text
article -
187
Hardware design and VLSI implementation of a byte-wise CRCgenerator chip
Published 1995“…These include areas such as error detection and correction in data communications, signature analysis, and mass storage devices for parallel information transfers…”
Get full text
Get full text
article -
188
An Effective Fault Diagnosis Technique for Wind Energy Conversion Systems Based on an Improved Particle Swarm Optimization
Published 2022“…The main idea behind the use of the PSO algorithm is to remove irrelevant features and extract only the most significant ones from raw data in order to improve the classification task using a neural networks classifier. …”
-
189
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
Published 2023“…Then, the Conjugate Self-Organizing Migration (CSOM) optimization algorithm is deployed to select the most relevant features to train the classifier, which also supports increased detection accuracy. …”
-
190
A novel hybrid methodology for fault diagnosis of wind energy conversion systems
Published 2023“…Therefore, a hybrid feature selection based diagnosis technique, that can preserve the advantages of wrapper and filter algorithms as well as RF model, is proposed. In the first phase, the neighborhood component analysis (NCA) filter algorithm is used to reduce and select only the pertinent features from the original raw data. …”
-
191
-
192
Multi Agent Reinforcement Learning Approach for Autonomous Fleet Management
Published 2019Get full text
doctoralThesis -
193
Anonymizing multimedia documents
Published 2016“…We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …”
Get full text
Get full text
Get full text
Get full text
article -
194
Benchmark on a large cohort for sleep-wake classification with machine learning techniques
Published 2019“…We propose the adoption of this publicly available large dataset, which is at least one order of magnitude larger than any other dataset, to systematically compare existing methods for the detection of sleep-wake stages, thus fostering the creation of new algorithms. …”
-
195
Downlink channel estimation for IMT-DS
Published 2001“…The DL channel of an IMT-DS system consists of time-multiplexed pilot and data symbols to facilitate coherent detection. To obtain channel estimates during pilot symbols, we propose a chip level adaptive channel estimation which performs better than the conventional method. …”
Get full text
Get full text
article -
196
Performance Analysis of Artificial Neural Networks in Forecasting Financial Time Series
Published 2013Get full text
doctoralThesis -
197
DeepRaman: Implementing surface-enhanced Raman scattering together with cutting-edge machine learning for the differentiation and classification of bacterial endotoxins
Published 2025“…ConclusionWe present the effectiveness of DeepRaman, an innovative architecture inspired by the Progressive Fourier Transform and integrated with the scalogram transformation method, in classifying raw SERS Raman spectral data from biological specimens with unparalleled accuracy relative to conventional machine learning algorithms. …”
Get full text
Get full text
Get full text
article -
198
An Infrastructure-Assisted Crowdsensing Approach for On-Demand Traffic Condition Estimation
Published 2019“…Our approach combines the strengths of mobile crowdsensing, with the support of the mobile infrastructure, a multi-criteria algorithm for the participants' selection, and a deductive rule-based model for traffic condition estimation. …”
Get full text
Get full text
Get full text
Get full text
article -
199
A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications
Published 2011“…Moreover, we derive an empirical energy model that analytically quantifies the energy consumed during data transmission as a function of the signal strength level and during data compression as a function of the data size. …”
Get full text
Get full text
Get full text
article -
200
A Digital DNA Sequencing Engine for Ransomware Analysis using a Machine Learning Network
Published 2020“…The proposed work contains three significant phases: Preprocessing and Feature Selection, DNA Sequence Generation and Ransomware Detection. In the first phase, data preprocessing and feature selection technique is applied to the collected dataset. …”
Get full text