Search alternatives:
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
backing » banking (Expand Search), lacking (Expand Search), packing (Expand Search)
element » elements (Expand Search)
search » research (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
backing » banking (Expand Search), lacking (Expand Search), packing (Expand Search)
element » elements (Expand Search)
search » research (Expand Search)
-
61
Information Warfare
Published 2015Get full text
Get full text
Get full text
Get full text
conferenceObject -
62
Transaction Dependency Based Approach for Database Damage Assessment Using a Matrix
Published 2017“…Hence, both affected and benign transactions will be rolled back, which is a waste of time. This paper presents an algorithm that works efficiently to assess the damage caused in the database by malicious transaction and recovers it. …”
Get full text
Get full text
Get full text
Get full text
article -
63
PERF solutions for distributed query optimization. (c1999)
Published 1999Get full text
Get full text
masterThesis -
64
Making progress with the automation of systematic reviews: principles of the International Collaboration for the Automation of Systematic Reviews (ICASR)
Published 2018“…Recent advances in natural language processing, text mining and machine learning have produced new algorithms that can accurately mimic human endeavour in systematic review activity, faster and more cheaply. …”
-
65
Nonlinear analysis of shell structures using image processing and machine learning
Published 2023“…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …”
-
66
Neural network-based failure rate prediction for De Havilland Dash-8 tires
Published 2006“…An artificial neural network (ANN) model for predicting the failure rate of De Havilland Dash-8 airplane tires utilizing the twolayered feed-forward back-propagation algorithm as a learning rule is developed. …”
Get full text
article -
67
NEURAL NETWORK MODEL FOR PLANNED REPLACEMENT OF BOEING 737 BRAKES
Published 2020“…One-layered feed-forward back-propagation algorithm for artificial neural network whereas three parameters model for Weibull are used for the analysis. …”
Get full text
article -
68
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…Dedicated weighting functions and various search algorithms have been developed for that purpose and will be presented here. …”
Get full text
Get full text
Get full text
Get full text
article -
69
Failure-Rate Prediction for De Havilland Dash-8 Tires Employing Neural-Network Technique
Published 2006“…An artificial neural-network model for predicting the failure rate of De Havilland Dash-8 airplane tires utilizing the two-layered feedforward back-propagation algorithm as a learning rule is developed. …”
Get full text
article -
70
FAILURE RATE ANALYSIS OF BOEING 737 BRAKES EMPLOYING NEURAL NETWORK
Published 2007“…One-layered feed-forward back-propagation algorithm for artificial neural network whereas three parameters model for Weibull are used for the analysis. …”
Get full text
article -
71
Design and analysis of entropy-constrained reflected residual vector quantization
Published 2002“…Jointly optimized RVQ (JORVQ) is an effective design algorithm for minimizing the overall quantization error. …”
Get full text
Get full text
article -
72
Solar power forecasting beneath diverse weather conditions using GD and LM-artificial neural networks
Published 2023“…A case study has been done in the Peer Panjal region. The data collected for four months with various parameters have been applied randomly as input data using GD and LM type of artificial neural network compared to actual solar energy data. …”
Get full text
-
73
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
Published 2021“…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …”
-
74
Role of authentication factors in Fin-tech mobile transaction security
Published 2023“…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…”
-
75
An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation
Published 2001“…Evolutionary algorithms have been effective in solving many search and optimization problems. …”
Get full text
article -
76
An evolutionary meta-heuristic for state justification insequential automatic test pattern generation
Published 2001“…Evolutionary algorithms have been effective in solving many search and optimization problems. …”
Get full text
Get full text
article -
77
Developing an online hate classifier for multiple social media platforms
Published 2020“…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …”
-
78
Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers
Published 2023“…The DT is trained offline using a set of experimental data and updated online to get the maximum possible accuracy. …”
-
79
Dynamic single node failure recovery in distributed storage systems
Published 2017“…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …”
Get full text
Get full text
Get full text
Get full text
article -
80
Efficient Seismic Volume Compression using the Lifting Scheme
Published 2000“…In addition, the lifting scheme offers: 1) a dramatic reduction of the required auxiliary memory, 2) an efficient combination with parallel rendering algorithms to perform arbitrary surface and volume rendering for interactive visualization, and 3) an easy integration in the parallel I/O seismic data loading routines. …”
Get full text
article