Search alternatives:
using algorithms » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
develop » developed (Expand Search)
using algorithms » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
develop » developed (Expand Search)
-
401
Innovative mobile E-healthcare systems
Published 2016“…To find which item in the cache can be evicted and replaced, cache replacement algorithms are used. Many caching approaches are proposed, but the SACCS—Scalable Asynchronous Cache Consistency Scheme—has proved to be more scalable than the others. …”
Get full text
Get full text
Get full text
Get full text
article -
402
Scatter search technique for exam timetabling
Published 2011“…Hence, solving this problem in realistic time requires the use of heuristic approaches. In this work, we develop an evolutionary heuristic technique based on the scatter search approach for finding good suboptimal solutions for exam timetabling. …”
Get full text
Get full text
Get full text
article -
403
Predicting stability of classes in an object-oriented system
Published 2010“…The stability of a class in object-oriented system is one software quality characteristic that is important to assess at the early development stages. However, a direct measure of this software quality characteristic is not possible. …”
Get full text
Get full text
Get full text
article -
404
Big Data Energy Management, Analytics and Visualization for Residential Areas
Published 2020“…With the rapid development of IoT based home appliances, it has become a possibility that home owners share with Utilities in the management of home appliances energy consumption. …”
Get full text
article -
405
Diagnosing failed distribution transformers using neural networks
Published 2001“…An artificial neural networks (ANN) system was developed for distribution transformer's failure diagnosis. …”
Get full text
Get full text
article -
406
Definition and selection of fuzzy sets in genetic‐fuzzy systems using the concept of fuzzimetric arcs
Published 2008“…Design/methodology/approach – The design was based on two principles: selection and optimization. …”
Get full text
Get full text
Get full text
Get full text
article -
407
An Alternating Projection Framework for Elementwise Masked Nonlinear Matrix Decomposition
Published 2025Get full text
doctoralThesis -
408
Guidance, Control and Trajectory Tracking of Small Fixed Wing Unmanned Aerial Vehicles (UAV's)
Published 2009Get full text
doctoralThesis -
409
On the complexity of multi-parameterized cluster editing
Published 2017“…In other words, Cluster Editing can be solved efficiently when the number of false positives/negatives per single data element is expected to be small compared to the minimum cluster size. …”
Get full text
Get full text
Get full text
Get full text
article -
410
SemIndex+: A semantic indexing scheme for structured, unstructured, and partly structured data
Published 2018“…Various weighting functions and a parallelized search algorithm have been developed for that purpose and are presented here. …”
Get full text
Get full text
Get full text
Get full text
article -
411
On the Generation of Quantified Lemmas
Published 2018“…This solution yields a sequence of lemmas and, finally, a proof based on these lemmas. Various techniques are developed to simplify the canonical solution resulting in a reduction of proof complexity. …”
-
412
Modeling and Identification of Nonlinear DC Motor Drive Systems Using Recurrent Wavelet Networks
Published 2013Get full text
doctoralThesis -
413
Autonomous Vehicles Delivery Systems: Analyzing Vehicle Routing Problems with a Moving Depot
Published 2019Get full text
doctoralThesis -
414
Privacy Preserving Cancellable Template Generation for Crypto-Biometric Authentication System
Published 2025“…The analysis of security and matching performance of the proposed preservation scheme has been evaluated against publicly available fingerprint database FVC2000 DB1, FVC2000 DB2, FVC2002 DB1, FVC2002 DB3, FVC2004 DB1 and FVC2004 DB3 containing 800 images of 100 persons, 8 images per person in each database using FMR, FAR, GAR, ROC Curve, and EER parameters. …”
-
415
Nonlinear Friction Identification of A Linear Voice Coil DC Motor
Published 2015Get full text
doctoralThesis -
416
Common weaving approach in mainstream languages for software security hardening
Published 2013“…In this paper, we propose a novel aspect-oriented approach based on GIMPLE, a language-independent and a tree-based representation generated by the GNU Compiler Collection (GCC), for the systemization of application security hardening. …”
Get full text
Get full text
Get full text
article -
417
Autopilot Design and Commercial Autopilot Evaluation Using Flybarless Helicopter
Published 2014Get full text
doctoralThesis -
418
Optimal Routing and Scheduling in E-commerce Logistics using Crowdsourcing Strategies
Published 2017Get full text
doctoralThesis -
419
Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants
Published 2024“…It also provides implications for tech-managers and algorithm designers to build effective voice technology for superior user experience.…”
-
420
Automated skills assessment in open surgery: A scoping review
Published 2025“…An overview of its applications can inform the scientific community and facilitate further developments. In this scoping review, we present the open surgeries and clinical settings where AI-based skill assessment has been applied, the kind of surgical data acquired for the AI-based algorithms, and the types of AI-based models used for automated skills assessment. …”