Search alternatives:
processing algorithm » processing algorithms (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
processing algorithm » processing algorithms (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
-
281
I Will Survive: An Event-driven Conformance Checking Approach Over Process Streams
Published 2023“…This paper introduces a new approximate algorithm – I Will Survive (IWS). The algorithm utilizes the trie data structure to improve the calculation speed, while remaining memory-efficient. …”
Get full text
Get full text
Get full text
-
282
Multi-marker-LD based genetic algorithm for tag SNP selection
Published 2014“…The performance of the three algorithms are compared with those of a recognized tag SNP selection algorithm using three different real data sets from the HapMap project. …”
Get full text
Get full text
Get full text
article -
283
A Recommended Replacement Algorithm for the Scalable Asynchronous Cache Consistency Scheme
Published 2018Get full text
Get full text
Get full text
Get full text
conferenceObject -
284
-
285
A Genetic Algorithm for Improving Accuracy of Software Quality Predictive Models
Published 2010“…In this work, we present a genetic algorithm to optimize predictive models used to estimate software quality characteristics. …”
Get full text
Get full text
Get full text
article -
286
Novel Peak Detection Algorithms for Pileup Minimization in Gamma Ray Spectroscopy
Published 2006“…This study uses the above facility in developing algorithms for digitally determining the basic pulse parameters and tackling the problem of pulse pile-up in Gamma-ray spectroscopy. …”
Get full text
Get full text
article -
287
Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms
Published 2022“…The outcomes revealed that these ML algorithms can be useful in predicting ground losses during wild blueberry harvesting in the selected fields.…”
-
288
Advancing Data Center Networks: A Focus on Energy and Cost Efficiency
Published 2023“…These topologies must incorporate fault-tolerant and efficient routing algorithms. Consequently, the data center network topology must dynamically adapt to ever-changing application requirements. …”
-
289
Design Optimization of Inductive Power Transfer Systems Considering Bifurcation and Equivalent AC Resistance for Spiral Coils
Published 2020“…Equivalent AC resistance of spiral coils is modeled based on eddy currents simulations using Finite Element Method (FEM) and Maxwell simulator. …”
-
290
-
291
Modeling and Guidance of an Underactuated Autonomous Underwater Vehicle
Published 2017Get full text
doctoralThesis -
292
-
293
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…Moreover, the DBRF classification model is deployed to categorize the normal and attacking data flows using optimized features. Here, the proposed DRF-DBRF security model's performance is validated and tested using five different and popular IoT benchmarking datasets. …”
-
294
LaScaDa: A Novel Scalable Topology for Data Center Network
Published 2020“…LaScaDa forwards packets between nodes using a new hierarchical row-based routing algorithm. …”
-
295
Heat rate curve approximation for power plants without data measuring devices
Published 2012“…The method is applied on a given power system, in which we calculate the electricity cost using the CAPSE (computer aided power economics) algorithm. …”
Get full text
article -
296
UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices
Published 2019“…The global evolution of wireless technologies and intelligent sensing devices are transforming the realization of smart cities. Among the myriad of use cases, there is a need to support applications whereby low-resource Internet of Things (IoT) devices need to upload their sensor data to a remote control centre by target hard deadlines; otherwise, the data becomes outdated and loses its value, for example, in emergency or industrial control scenarios. …”
Get full text
Get full text
Get full text
Get full text
article -
297
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
298
A Novel Partitioned Random Forest Method-Based Facial Emotion Recognition
Published 2025“…Using three statistical measures Lyapunov exponents (LE), Correlation Dimension (CD), and approximate entropy (AE), we evaluated the performance of machine learning algorithms over different data lengths. …”
-
299
-
300
XBeGene: Scalable XML Documents Generator by Example Based on Real Data
Published 2012“…XML datasets of various sizes and properties are needed to evaluate the correctness and efficiency of XML-based algorithms and applications. While several downloadable datasets can be found online, these are predefined by system experts and might not be suitable to evaluate every algorithm. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject