Showing 1 - 19 results of 19 for search '(( source code algorithm ) OR ((( complement component algorithm ) OR ( element te algorithm ))))', query time: 0.13s Refine Results
  1. 1

    Reliability of artificial intelligence in predicting total knee arthroplasty component sizes: a systematic review by Loay A. Salman (14150322)

    Published 2023
    “…All included studies were published between 2021 and 2022, with a total of nine different AI algorithms reported. Among these AI models, the accuracy of TKA femoral component sizing prediction ranged from 88.3 to 99.7% within a deviation of one size, while tibial component sizing exhibited an accuracy ranging from 90 to 99.9% ± 1 size.…”
  2. 2

    LNCRI: Long Non-Coding RNA Identifier in Multiple Species by Saleh Musleh (15279190)

    Published 2021
    “…The benchmark datasets and source code are available in GitHub: http://github.com/smusleh/LNCRI.…”
  3. 3
  4. 4

    An Intensive and Comprehensive Overview of JAYA Algorithm, its Versions and Applications by Abu Zitar, Raed

    Published 2021
    “…Furthermore, the open sources code of JAYA algorithm are identified to provide enrich resources for JAYA research communities. …”
    Get full text
  5. 5
  6. 6
  7. 7

    Assessment of four dose calculation algorithms using IAEA-TECDOC-1583 with medium dependency correction factor (K<sub>med</sub>) application by Aram Rostami (22045274)

    Published 2024
    “…</p><h3>Methods</h3><p dir="ltr">BEAMnrc codes simulate radiation sources and model radiation transport for 6 MV and 15 MV photon beams. …”
  8. 8
  9. 9
  10. 10

    UML-based regression testing for OO software by Mansour, Nashat

    Published 2010
    “…When working with large and complex object-oriented systems, source code-based regression testing is usually costly. …”
    Get full text
    Get full text
    Get full text
    article
  11. 11

    Making progress with the automation of systematic reviews: principles of the International Collaboration for the Automation of Systematic Reviews (ICASR) by Elaine Beller (44602)

    Published 2018
    “…</p><p dir="ltr">This paper sets out the principles devised at that meeting, which cover the need for improvement in efficiency of SR tasks, automation across the spectrum of SR tasks, continuous improvement, adherence to high quality standards, flexibility of use and combining components, the need for a collaboration and varied skills, the desire for open source, shared code and evaluation, and a requirement for replicability through rigorous and open evaluation.…”
  12. 12

    Common weaving approach in mainstream languages for software security hardening by Alhadidi, Dima

    Published 2013
    “…In the first approach, we prove them according to the rules and algorithms provided in this paper. In the second approach, we accommodate Kniesel's discipline that ensures that security solutions specified by our approach are applied at all and only the required points in source code, taking into consideration weaving interactions and interferences. …”
    Get full text
    Get full text
    Get full text
    article
  13. 13

    Developing an online hate classifier for multiple social media platforms by Joni Salminen (7434770)

    Published 2020
    “…Findings support the generalizability of the best model, as the platform-specific results from Twitter and Wikipedia are comparable to their respective source papers. We make our code publicly available for application in real software systems as well as for further development by online hate researchers.…”
  14. 14

    Nonlinear analysis of shell structures using image processing and machine learning by M.S. Nashed (16392961)

    Published 2023
    “…All created data and source codes are openly available.</p><h2>Other Information</h2><p dir="ltr">Published in: Advances in Engineering Software<br>License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1016/j.advengsoft.2022.103392" target="_blank">https://dx.doi.org/10.1016/j.advengsoft.2022.103392</a></p>…”
  15. 15

    Blockchain-Based Decentralized Architecture for Software Version Control by Muhammad Hammad (17541570)

    Published 2023
    “…The proof of authority (PoA) consensus algorithm will be used to approve the developer communicating modifications to the private blockchain network; the authority will only provide permission and will not be able to add, edit, or delete code files. …”
  16. 16

    The Generalization of Bidirectional Dual Active Bridge DC/DC Converter Modulation Schemes: State-of-the-Art Analysis under Triple Phase Shift Control by Yasen Harrye (22415632)

    Published 2023
    “…Power equations, range of power transferred and zero-voltage switching (ZVS) are derived for all the modes under TPS without assuming fundamental component analysis. Additionally, a generic optimization algorithm is developed to show the advantages of TPS modulation, and thus, the analysis in this paper offers a valuable insight for single-phase DAB converter designers in identifying a wide range of optimization algorithms to achieve higher efficiency under TPS modulation. …”
  17. 17
  18. 18

    Design and analysis of entropy-constrained reflected residual vector quantization by Mousa, W.A.H.

    Published 2002
    “…Jointly optimized RVQ (JORVQ) is an effective design algorithm for minimizing the overall quantization error. …”
    Get full text
    Get full text
    article
  19. 19

    Machine Learning Techniques for Pharmaceutical Bioinformatics by SULTAN, AHMED ATTA AHMED

    Published 2018
    “…Drug molecule interacts with multiple components in the biological system, for example, enzymes, proteins, among other drugs. …”
    Get full text