Showing 1 - 20 results of 64 for search 'server ((selection algorithm) OR (detection algorithm))', query time: 0.22s Refine Results
  1. 1
  2. 2
  3. 3

    CorrEA: A Web Server for Optimizing Correlations between Calculated Energies and Activities in Ligand–Receptor Systems Considering Multiple Binding Site Conformations by Sergio Alfaro (9765813)

    Published 2025
    “…CorrEA performs a genetic algorithm (GA) selection to extract a representative complex for each ligand that better adjusts the global correlation between calculated docking energy values and experimental logarithmic biological activities. …”
  4. 4

    PI3K-Seeker: A Machine Learning-Powered Web Tool to Discover PI3K Inhibitors by Francisca Joseli Freitas de Sousa (22640155)

    Published 2025
    “…In this study, we developed PI3K-Seeker, a web server based on a two-stage prediction process to find new PI3K inhibitors. …”
  5. 5

    PI3K-Seeker: A Machine Learning-Powered Web Tool to Discover PI3K Inhibitors by Francisca Joseli Freitas de Sousa (22640155)

    Published 2025
    “…In this study, we developed PI3K-Seeker, a web server based on a two-stage prediction process to find new PI3K inhibitors. …”
  6. 6

    PI3K-Seeker: A Machine Learning-Powered Web Tool to Discover PI3K Inhibitors by Francisca Joseli Freitas de Sousa (22640155)

    Published 2025
    “…In this study, we developed PI3K-Seeker, a web server based on a two-stage prediction process to find new PI3K inhibitors. …”
  7. 7
  8. 8

    Comparison with existing work. by Khondokar Oliullah (21553289)

    Published 2025
    “…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
  9. 9

    Registration phase. by Khondokar Oliullah (21553289)

    Published 2025
    “…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
  10. 10

    Performance comparison of different ML models. by Khondokar Oliullah (21553289)

    Published 2025
    “…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
  11. 11

    Classification Report for the proposed model. by Khondokar Oliullah (21553289)

    Published 2025
    “…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
  12. 12

    ROC curve of the proposed model. by Khondokar Oliullah (21553289)

    Published 2025
    “…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
  13. 13

    Fog-IoT architecture. by Khondokar Oliullah (21553289)

    Published 2025
    “…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
  14. 14

    Computational cost of the proposed approach. by Khondokar Oliullah (21553289)

    Published 2025
    “…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
  15. 15

    Confusion Matrix of different ML models. by Khondokar Oliullah (21553289)

    Published 2025
    “…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
  16. 16

    Performance metrics of applied ML models. by Khondokar Oliullah (21553289)

    Published 2025
    “…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
  17. 17

    Archive containing manufacturing files. by Julian Bigge (22331861)

    Published 2025
    “…<div><p>In this paper we propose the Hatching-Box, a novel in situ imaging and analysis system to automatically monitor and quantify the developmental behavior of <i>Drosophila melanogaster</i> in standard rearing vials and during regular rearing routines, reducing the need for explicit experiments.This is achieved by combining custom tailored imaging hardware with dedicated detection and tracking algorithms, enabling the quantification of larvae, filled/empty pupae and flies over multiple days. …”
  18. 18

    Landscape Change Monitoring System (LCMS) Puerto Rico USVI Annual QA Bits by U.S. Forest Service (17476914)

    Published 2025
    “…</p><p>Predictor layers for the LCMS model include outputs from the LandTrendr and CCDC change detection algorithms and terrain information. These components are all accessed and processed using Google Earth Engine (Gorelick et al., 2017). …”
  19. 19

    Landscape Change Monitoring System (LCMS) Hawaii Annual Landcover by U.S. Forest Service (17476914)

    Published 2025
    “…</p><p>Predictor layers for the LCMS model include outputs from the LandTrendr and CCDC change detection algorithms and terrain information. These components are all accessed and processed using Google Earth Engine (Gorelick et al., 2017). …”
  20. 20

    Landscape Change Monitoring System (LCMS) Alaska Most Recent Year of Gain (Image Service) by U.S. Forest Service (17476914)

    Published 2025
    “…</p><p>Predictor layers for the LCMS model include outputs from the LandTrendr and CCDC change detection algorithms and terrain information. These components are all accessed and processed using Google Earth Engine (Gorelick et al., 2017). …”