Search alternatives:
encoding algorithm » cosine algorithm (Expand Search)
backing » banking (Expand Search), lacking (Expand Search), packing (Expand Search)
element » elements (Expand Search)
jaya » maya (Expand Search), aya (Expand Search), jana (Expand Search)
encoding algorithm » cosine algorithm (Expand Search)
backing » banking (Expand Search), lacking (Expand Search), packing (Expand Search)
element » elements (Expand Search)
jaya » maya (Expand Search), aya (Expand Search), jana (Expand Search)
-
1
A PARALLEL AND DISTRIBUTED FRAMEWORK FOR IMPLEMENTING BACK PROPAGATION ALGORITHM IN BIG DATA
Published 2020Get full text
Get full text
masterThesis -
2
Efficient Approximate Conformance Checking Using Trie Data Structures
Published 2021Subjects: “…Estimation error,Runtime,Computational modeling,Data structures,Approximation algorithms,Encoding,Computational efficiency…”
Get full text
Get full text
Get full text
-
3
-
4
The unified effect of data encoding, ansatz expressibility and entanglement on the trainability of HQNNs
Published 2023“…We focus on the combined influence of data encoding, qubit entanglement, and ansatz expressibility in hybrid quantum neural networks (HQNNs) for multi-class classification tasks. …”
-
5
A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks
Published 2022“…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …”
-
6
Information warfare recovery-fighting back through the matrix. (c2012)
Published 2012Get full text
Get full text
masterThesis -
7
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…Then, the DRF optimization algorithm is applied to optimally tune the features required for accurate intrusion detection and classification. …”
-
8
A Hash-Based Assessment and Recovery Algorithm for Distributed Healthcare Systems Using Blockchain Technology
Published 2020“…Here rises the need for an algorithm that can assess the damage that occurred before recovering the database back to its consistent state. …”
Get full text
Get full text
Get full text
masterThesis -
9
Incorporation of Robust Sliding Mode Control and Adaptive Multi-Layer Neural Network-Based Observer for Unmanned Aerial Vehicles
Published 2024“…The MLNN observer, employing a modified back-propagation algorithm, is used for the quadrotor’s state estimation. …”
-
10
A hybrid graph representation for recursive backtracking algorithms
Published 2017“…The use of efficient data structures is necessary for fast graph modification modules as well as fast take-back procedures. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
11
Evolutionary algorithm for predicting all-atom protein structure
Published 2011“…We evaluate our algorithm on proteins taken from a Protein Data Bank. …”
Get full text
Get full text
Get full text
conferenceObject -
12
Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm
Published 2022“…The antecedent part parameters (Gaussian membership function parameters) are encoded as a population of artificial swarm of grasshoppers and optimized using its algorithm. …”
-
13
Minimizing Deadline Misses of Mobile IoT Requests in a Hybrid Fog- Cloud Computing Environment
Published 2019Get full text
doctoralThesis -
14
-
15
Information reconciliation through agent controlled graph model. (c2018)
Published 2018“…Even though prevention techniques exist, they’re not enough to fully secure the data from malicious activities. Thus, the need for a detection and recovery algorithm to assess the damage and bring the database back to its consistent state in case of an attack. …”
Get full text
Get full text
Get full text
masterThesis -
16
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
Published 2024“…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …”
-
17
PERF solutions for distributed query optimization. (c1999)
Published 1999Get full text
Get full text
masterThesis -
18
Competitive learning/reflected residual vector quantization for coding angiogram images
Published 2003“…Medical images need to be compressed for the purpose of storage/transmission of a large volume of medical data. Reflected residual vector quantization (RRVQ) has emerged recently as one of the computationally cheap compression algorithms. …”
Get full text
Get full text
article -
19
Design and analysis of entropy-constrained reflected residual vector quantization
Published 2002“…Residual vector quantization (RVQ) is a vector quantization (VQ) paradigm which imposes structural constraints on the encoder in order to reduce the encoding search burden and memory storage requirements of an unconstrained VQ. …”
Get full text
Get full text
article -
20
Efficient Seismic Volume Compression using the Lifting Scheme
Published 2000“…In addition, the lifting scheme offers: 1) a dramatic reduction of the required auxiliary memory, 2) an efficient combination with parallel rendering algorithms to perform arbitrary surface and volume rendering for interactive visualization, and 3) an easy integration in the parallel I/O seismic data loading routines. …”
Get full text
article