Search alternatives:
post algorithm » cosine algorithm (Expand Search)
deer algorithm » search algorithm (Expand Search)
elements deer » elementi per (Expand Search)
develop » developed (Expand Search)
backing » banking (Expand Search), lacking (Expand Search), packing (Expand Search)
post algorithm » cosine algorithm (Expand Search)
deer algorithm » search algorithm (Expand Search)
elements deer » elementi per (Expand Search)
develop » developed (Expand Search)
backing » banking (Expand Search), lacking (Expand Search), packing (Expand Search)
-
1
A PARALLEL AND DISTRIBUTED FRAMEWORK FOR IMPLEMENTING BACK PROPAGATION ALGORITHM IN BIG DATA
Published 2020Get full text
Get full text
masterThesis -
2
Information warfare recovery-fighting back through the matrix. (c2012)
Published 2012Get full text
Get full text
masterThesis -
3
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…Then, the DRF optimization algorithm is applied to optimally tune the features required for accurate intrusion detection and classification. …”
-
4
A Hash-Based Assessment and Recovery Algorithm for Distributed Healthcare Systems Using Blockchain Technology
Published 2020“…Here rises the need for an algorithm that can assess the damage that occurred before recovering the database back to its consistent state. …”
Get full text
Get full text
Get full text
masterThesis -
5
A Survey and Comparison of Post-Quantum and Quantum Blockchains
Published 2023“…The first approach involves post-quantum blockchains, which aim to utilize classical cryptographic algorithms resilient to quantum attacks. …”
-
6
A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks
Published 2022“…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …”
-
7
Incorporation of Robust Sliding Mode Control and Adaptive Multi-Layer Neural Network-Based Observer for Unmanned Aerial Vehicles
Published 2024“…The MLNN observer, employing a modified back-propagation algorithm, is used for the quadrotor’s state estimation. …”
-
8
Legal and Ethical Considerations of Artificial Intelligence for Residents in Post-Acute and Long-Term Care
Published 2024“…<p>This article proposes a framework for examining the ethical and legal concerns for using artificial intelligence (AI) in post-acute and long-term care (PA-LTC). It argues that established frameworks on health, AI, and the law should be adapted to specific care contexts. …”
-
9
A hybrid graph representation for recursive backtracking algorithms
Published 2017“…The use of efficient data structures is necessary for fast graph modification modules as well as fast take-back procedures. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
10
Evolutionary algorithm for predicting all-atom protein structure
Published 2011“…We evaluate our algorithm on proteins taken from a Protein Data Bank. …”
Get full text
Get full text
Get full text
conferenceObject -
11
Minimizing Deadline Misses of Mobile IoT Requests in a Hybrid Fog- Cloud Computing Environment
Published 2019Get full text
doctoralThesis -
12
Prediction of pressure gradient for oil-water flow: A comprehensive analysis on the performance of machine learning algorithms
Published 2022“…<p dir="ltr">Pressure gradient (PG) in liquid-liquid flow is one of the key components to design an energy-efficient transportation system for wellbores. This study aims to develop five robust machine learning (ML) algorithms and their fusions for a wide range of flow patterns (FP) regimes. …”
-
13
Information reconciliation through agent controlled graph model. (c2018)
Published 2018“…Even though prevention techniques exist, they’re not enough to fully secure the data from malicious activities. Thus, the need for a detection and recovery algorithm to assess the damage and bring the database back to its consistent state in case of an attack. …”
Get full text
Get full text
Get full text
masterThesis -
14
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
Published 2019“…These were subjected to two different processes called contrast enhancement and segmentation of vein regions. Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …”
-
15
Information Warfare
Published 2015Get full text
Get full text
Get full text
Get full text
conferenceObject -
16
Transaction Dependency Based Approach for Database Damage Assessment Using a Matrix
Published 2017“…Hence, both affected and benign transactions will be rolled back, which is a waste of time. This paper presents an algorithm that works efficiently to assess the damage caused in the database by malicious transaction and recovers it. …”
Get full text
Get full text
Get full text
Get full text
article -
17
PERF solutions for distributed query optimization. (c1999)
Published 1999Get full text
Get full text
masterThesis -
18
Applications of fast fourier transform in the integrity evaluation of deep foundations
Published 2016“…This paper reports on an innovative and comprehensive method proposed for the quality control of drilled shafts that overcomes several limitations of conventional methods. The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …”
Get full text
Get full text
Get full text
Get full text
article -
19
Neural network-based failure rate prediction for De Havilland Dash-8 tires
Published 2006“…An artificial neural network (ANN) model for predicting the failure rate of De Havilland Dash-8 airplane tires utilizing the twolayered feed-forward back-propagation algorithm as a learning rule is developed. …”
Get full text
article -
20
NEURAL NETWORK MODEL FOR PLANNED REPLACEMENT OF BOEING 737 BRAKES
Published 2020“…One-layered feed-forward back-propagation algorithm for artificial neural network whereas three parameters model for Weibull are used for the analysis. …”
Get full text
article