Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
ipca algorithm » jaya algorithm (Expand Search)
source » sources (Expand Search), resource (Expand Search)
element » elements (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
ipca algorithm » jaya algorithm (Expand Search)
source » sources (Expand Search), resource (Expand Search)
element » elements (Expand Search)
-
1
Accurate multiple network alignment through context-sensitive random walk
Published 2015“…Until now, a number of network alignment algorithms have been proposed based on different formulations and approaches, many of them focusing on pairwise alignment. …”
-
2
LNCRI: Long Non-Coding RNA Identifier in Multiple Species
Published 2021“…The benchmark datasets and source code are available in GitHub: http://github.com/smusleh/LNCRI.…”
-
3
-
4
An Intensive and Comprehensive Overview of JAYA Algorithm, its Versions and Applications
Published 2021“…Furthermore, the open sources code of JAYA algorithm are identified to provide enrich resources for JAYA research communities. …”
Get full text
-
5
-
6
-
7
Assessment of four dose calculation algorithms using IAEA-TECDOC-1583 with medium dependency correction factor (K<sub>med</sub>) application
Published 2024“…</p><h3>Methods</h3><p dir="ltr">BEAMnrc codes simulate radiation sources and model radiation transport for 6 MV and 15 MV photon beams. …”
-
8
-
9
-
10
Design and analysis of entropy-constrained reflected residual vector quantization
Published 2002“…Jointly optimized RVQ (JORVQ) is an effective design algorithm for minimizing the overall quantization error. …”
Get full text
Get full text
article -
11
-
12
Measuring ripple effect for object-oriented programs. (c2004)
Published 2004Get full text
Get full text
masterThesis -
13
-
14
Nonlinear analysis of shell structures using image processing and machine learning
Published 2023“…All created data and source codes are openly available.</p><h2>Other Information</h2><p dir="ltr">Published in: Advances in Engineering Software<br>License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1016/j.advengsoft.2022.103392" target="_blank">https://dx.doi.org/10.1016/j.advengsoft.2022.103392</a></p>…”
-
15
An Event-Triggered Robust Attitude Control of Flexible Spacecraft With Modified Rodrigues Parameters Under Limited Communication
Published 2019“…Aligned with these design objectives, a robust event-triggered attitude control algorithm is proposed to regulate the orientation of a flexible spacecraft subjected to parametric uncertainties, external disturbances, and vibrations due to flexible appendages. …”
-
16
-
17
A Fusion-Based Approach for Skin Cancer Detection Combining Clinical Images, Dermoscopic Images, and Metadata
Published 2025Get full text
doctoralThesis -
18
UML-based regression testing for OO software
Published 2010“…When working with large and complex object-oriented systems, source code-based regression testing is usually costly. …”
Get full text
Get full text
Get full text
article -
19
Common weaving approach in mainstream languages for software security hardening
Published 2013“…In the first approach, we prove them according to the rules and algorithms provided in this paper. In the second approach, we accommodate Kniesel's discipline that ensures that security solutions specified by our approach are applied at all and only the required points in source code, taking into consideration weaving interactions and interferences. …”
Get full text
Get full text
Get full text
article -
20
Developing an online hate classifier for multiple social media platforms
Published 2020“…Findings support the generalizability of the best model, as the platform-specific results from Twitter and Wikipedia are comparable to their respective source papers. We make our code publicly available for application in real software systems as well as for further development by online hate researchers.…”