Search alternatives:
using algorithm » cosine algorithm (Expand Search)
mean algorithm » deer algorithm (Expand Search), search algorithm (Expand Search)
Showing 781 - 800 results of 907 for search '(((( data using algorithm ) OR ( tests using algorithm ))) OR ( elements mean algorithm ))', query time: 0.10s Refine Results
  1. 781

    Dynamic single node failure recovery in distributed storage systems by Itani, M.

    Published 2017
    “…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  2. 782

    Deepfakes Signatures Detection in the Handcrafted Features Space by Hamadene, Assia

    Published 2023
    “…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
    Get full text
  3. 783
  4. 784

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone by Saeed Ullah Jan (9079260)

    Published 2021
    “…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…”
  5. 785
  6. 786
  7. 787

    Hybrid Interval Type-2 Fuzzy PID+I Controller for a Multi-DOF Oilwell Drill-String System by Abdelbaset Laib (16904688)

    Published 2022
    “…An optimal hybrid interval Type-2 fuzzy PID+I logic controller (OH-IT2FPID+I) using a practical swarm optimization algorithm for a multi-degree-of-freedom oil well drill-string system is proposed in this paper. …”
  8. 788

    Systems biology analysis reveals NFAT5 as a novel biomarker and master regulator of inflammatory breast cancer by Andrea Remo (447375)

    Published 2015
    “…</p><h3>Methods</h3><p dir="ltr">In-silico modeling and Algorithm for the Reconstruction of Accurate Cellular Networks (ARACNe) on IBC/non-IBC (nIBC) gene expression data (n = 197) was employed to identify novel master regulators connected to the IBC phenotype. …”
  9. 789

    Effective dispatch strategies assortment according to the effect of the operation for an islanded hybrid microgrid by Sk.A. Shezan (21323048)

    Published 2022
    “…In HOMER software, all the possible dispatch algorithms were analyzed, and the power system responses and reliability study were carried out using DIgSILENT PowerFactory. …”
  10. 790
  11. 791

    Axes-Based Encryption Key by Haidar, Imane

    Published 2018
    “…For this, a need of robust security systems is raised to ensure that our data will be kept safe. This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  12. 792

    Integration of nonparametric fuzzy classification with an evolutionary-developmental framework to perform music sentiment-based analysis and composition by Abboud, Ralph

    Published 2019
    “…Over the past years, several approaches have been developed to create algorithmic music composers. Most existing solutions focus on composing music that appears theoretically correct or interesting to the listener. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  13. 793

    ON THE FFT OF 1-BIT DITHER-QUANTIZED DETERMINISTIC SIGNALS by Cheded, L.

    Published 2020
    “…This loss in accuracy will in turn prohibit exploiting the practical advantages that an FFT algorithm, with a coarsely-quantized input, will otherwise enjoy. …”
    Get full text
    article
  14. 794

    On the protection of power system: Transmission line fault analysis based on an optimal machine learning approach by Md. Sihab Uddin (17542488)

    Published 2022
    “…The design is carried out based on the selection of the optimal model parameters using a search optimization algorithm called GridSearchCV. …”
  15. 795
  16. 796

    Resilience analytics: coverage and robustness in multi-modal transportation networks by Abdelkader Baggag (14153040)

    Published 2018
    “…In this work, we propose MUME, an efficient algorithm for Multi-modal Urban Mobility Estimation, that takes advantage of the special structure of the supra-Laplacian matrix of the transportation multiplex, to compute the coverage of the system. …”
  17. 797
  18. 798

    A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications by Sharafeddine, Sanaa

    Published 2011
    “…However, the computational as well as memory access requirements of compression algorithms could consume more energy than simply transmitting data uncompressed. …”
    Get full text
    Get full text
    Get full text
    article
  19. 799
  20. 800

    A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis by Alaa Abd-Alrazaq (17430900)

    Published 2021
    “…Specifically, we used a clustering algorithm to group published articles based on the similarity of their abstracts to identify research hotspots and current research directions. …”