Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
new algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search)
element » elements (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
new algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search)
element » elements (Expand Search)
-
61
Machine learning based approaches for intelligent adaptation and prediction in banking business processes. (c2018)
Published 2018“…The proposed scheme is capable of assessing the deployed access control polices and updating them systematically with new roles based on employees behaviors and system constraints. …”
Get full text
Get full text
Get full text
masterThesis -
62
DASSI: differential architecture search for splice identification from DNA sequences
Published 2022“…This has been fueled through the development of new DL architectures. Yet genomics possesses unique challenges that requires customization and development of new DL models.…”
-
63
Design and Development of a Synergetic Controller for a Permanent Magnet Synchronous Motor Drive System
Published 2017Get full text
doctoralThesis -
64
H.264/AVC to HEVC Video Transcoder Based on Dynamic Thresholding and Content Modeling
Published 2014“…The new video coding standard, HEVC, was developed to succeed the current standard, H.264/AVC, as the state of the art in video compression. …”
Get full text
article -
65
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
Published 2015“…Experiments carried out on synthetic and real-life XACML policies explore the relevance of our analysis algorithms with acceptable overhead. …”
Get full text
Get full text
Get full text
article -
66
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
Published 2021“…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …”
Get full text
-
67
SemIndex: Semantic-Aware Inverted Index
Published 2017“…We also provide an extended query model and related processing algorithms with the help of SemIndex. To investigate its effectiveness, we set up experiments to test the performance of SemIndex. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
68
Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model
Published 2024“…The performance level improvements are practically summarized in both the transmission and reception entities with the help of the proposed hybrid network architecture and the associated Dual Deep Network algorithm. …”
-
69
Internal Model Control Structure Using Adaptive Inverse Control Strategy
Published 2003“…In this paper, we propose a new adaptive IMC scheme based on adaptive finite impulse response filters, which can be designed for both minimum and non-minimum phase systems in the same fashion. …”
Get full text
Get full text
article -
70
Accelerating Blockchain Transaction Verification With Parallel Computing
Published 2024Get full text
doctoralThesis -
71
Oversampling techniques for imbalanced data in regression
Published 2024“…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …”
-
72
Blockchain-Based Decentralized Architecture for Software Version Control
Published 2023“…The proof of authority (PoA) consensus algorithm will be used to approve the developer communicating modifications to the private blockchain network; the authority will only provide permission and will not be able to add, edit, or delete code files. …”
-
73
Modeling and Control of a Thermally Driven MEMS Actuator for RF Applications
Published 2017Get full text
doctoralThesis -
74
-
75
Structural similarity evaluation between XML documents and DTDs
Published 2007“…The automatic processing and management of XML-based data are ever more popular research issues due to the increasing abundant use of XML, especially on the Web. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
76
A survey and comparison of wormhole routing techniques in a meshnetworks
Published 1997“…These multiprocessing systems consist of processing elements or nodes which are connected together by interconnection networks in various topologies. …”
Get full text
Get full text
article -
77
Assessment of static pile design methods and non-linear analysis of pile driving
Published 2006“…Field experiment results are used to validate the numerical simulation. …”
Get full text
Get full text
Get full text
masterThesis -
78
-
79
-
80
UML-based regression testing for OO software
Published 2010“…For the second phase, we present algorithms for detecting system level changes in the interaction overview diagram. …”
Get full text
Get full text
Get full text
article