-
1
Application of Heuristic Algorithms for Multiuser Detection
Published 0000Get full text
Get full text
article -
2
-
3
-
4
-
5
-
6
Efficient algorithm for collision detection and path planning for robotics application
Published 2000Get full text
masterThesis -
7
Novel Peak Detection Algorithms for Pileup Minimization in Gamma Ray Spectroscopy
Published 2006“…A number of parameter estimation and digital online peak localisation algorithms are being developed, including a pulse classification technique which uses a simple peak search routine based on the smoothed first derivative method, which gave a percentage error of peak amplitude of less than 1%. …”
Get full text
Get full text
article -
8
A decoding algorithm for I-Q space-time coded systems in fadingenvironments
Published 2000“…Therefore, a simplified decoding algorithm is proposed. It is based on symbol-by-symbol detection of the Q/I components in the I/Q decoders. …”
Get full text
Get full text
article -
9
-
10
-
11
-
12
EFFICIENT LOCALIZATION ALGORITHMS FOR WIRELESS GAS LEAKAGE DETECTION IN OIL/GAS INDUSTRY
Published 2020Get full text
masterThesis -
13
Detecting Game Bugs Using Genetic Algorithms And Reachability Analysis Of Colored Petri Nets Models
Published 2020Get full text
masterThesis -
14
Application of updated joint detection algorithm for the analysis of drilling parameters of roof bolters in multiple joints conditions
Published 2017“…For this purpose, computer programs based on updated pattern recognition algorithms were developed for joint-detection and classification of rock types to offer an estimated strength. …”
Get full text
Get full text
Get full text
conferenceObject -
15
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Published 2022“…Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. …”
-
16
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…Currently, malware continues to represent one of the main computer security threats. It is difficult to have efficient detection systems to precisely separate normal behavior from malicious behavior, based on the analysis of network traffic. …”
Get full text
-
17
Wearable Real-Time Heart Attack Detection and Warning System to Reduce Road Accidents
Published 2019“…It was observed that the linear classification algorithm was not able to detect heart attack in noisy data, whereas the support vector machine (SVM) algorithm with polynomial kernel with extended time–frequency features using extended modified B-distribution (EMBD) showed highest accuracy and was able to detect 97.4% and 96.3% of ST-elevation myocardial infarction (STEMI) and non-ST-elevation MI (NSTEMI), respectively. …”
-
18
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
Published 2024“…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …”
-
19
A machine learning model for early detection of diabetic foot using thermogram images
Published 2021“…Several studies have reported that thermogram images may help to detect an increase in plantar temperature prior to DFU. …”
-
20