Search alternatives:
using algorithm » cosine algorithm (Expand Search)
levels using » cells using (Expand Search)
using algorithm » cosine algorithm (Expand Search)
levels using » cells using (Expand Search)
-
201
Detecting and Predicting Archaeological Sites Using Remote Sensing and Machine Learning—Application to the Saruq Al-Hadid Site, Dubai, UAE
Published 2023“…The modelling and prediction accuracies are expected to improve with the insertion of a neural network and backpropagation algorithms based on the performed cluster groups following more recent field surveys. …”
Get full text
article -
202
Adaptive false discovery rate for wavelet denoising of pavement continuous deflection measurements
Published 2016“…The algorithm minimizes the classification error of features in the wavelet transform domain by adaptively selecting the level at which to control the false discovery rate. …”
Get full text
Get full text
Get full text
Get full text
article -
203
-
204
Approximate XML structure validation technical report
Published 2014“…Our approach exploits the concept of tree edit distance, introducing a novel edit distance recurrence and dedicated algorithms to effectively compare XML documents and grammar structures, modeled as ordered labeled trees. …”
Get full text
Get full text
Get full text
article -
205
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
Published 2023“…Moreover, the Reconciliate Multi-Agent Markov Learning (RMML) based classification algorithm is used to predict the intrusion with its appropriate classes. …”
-
206
Genetic Fuzzimetric Technique (GFT)
Published 2012“…Integration of fuzzy systems with genetic algorithm has been identified by researchers as a useful technique of optimizing systems under uncertainty. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
207
-
208
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
Published 2021“…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …”
Get full text
-
209
A novel approach for real time flows scheduling
Published 2006“…A plethora of packet-scheduling algorithms have been proposed in the literature in order to meet the stringent time constraints of real time flows at an IP router level. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
210
Assessment of static pile design methods and non-linear analysis of pile driving
Published 2006“…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …”
Get full text
Get full text
Get full text
masterThesis -
211
A comparative study of regression testing methods. (c1996)
Published 1996Get full text
Get full text
masterThesis -
212
Blockchain-Based Decentralized Architecture for Software Version Control
Published 2023“…<p dir="ltr">Version control is an important component of configuration management, and most enterprise-level software uses different tools and technologies to manage the software version control such as CVS, Subversion, or Perforce. …”
-
213
An integrated partitioning and synthesis system for dynamically reconfigurable Multi-FPGA architectures
Published 2017“…This paper presents an overview of SPARCS and the various algorithms used in the system, along with a brief description of how a JPEG-like image compression algorithm is mapped to a Multi-FPGA board using SPARCS.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
214
Degree-Based Network Anonymization
Published 2020“…Our model suggests a convenient privacy level for each net- work based on the standard deviation of its degrees. …”
Get full text
Get full text
Get full text
masterThesis -
215
Developing a Cooperative Behavior for Multi Agents System Application to Robot Soccer
Published 2007Get full text
doctoralThesis -
216
A simple approach for testing web service based applications
Published 2005“…Test cases are executed automatically using a test execution algorithm and a test framework is also presented. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
217
3D GEOSTATISTICAL MODELING OF FACIES AND PETROPHYSICAL PROPERTIES OF THE UPPER KHARTAM OUTCROP OF KHUFF FORMATION, CENTRAL SAUDI ARABIA
Published 2020“…In the context of 3D modelling, lithofacies within each zone was populated separately by using different geostatistical algorithm. Based on the relative sea level, the dominated lithofacies and the presence or absence of marine fauna, the studied interval was subdivided into three broad intervals. …”
Get full text
masterThesis -
218
Design and analysis of efficient and secure elliptic curve cryptoprocessors.
Published 2006“…Elliptic Curve Cryptosystems have attracted many researchers and have been included in many standards such as IEEE, ANSI, NIST, SEC and WTLS. The ability to use smaller keys and computationally more efficient algorithms compared with earlier public key cryptosystems such as RSA and ElGamal are two main reasons why elliptic curve cryptosystems are becoming more popular. …”
Get full text
masterThesis -
219
Improving the Resilience of Smart Distribution Networks against Cyber Attacks
Published 2022Get full text
doctoralThesis -
220
Analyzing the Influence of Climate and Anthropogenic Development on Vegetation Cover in the Coastal Ecosystems of GCC
Published 2025“…We used Landsat satellite imagery and a Random Forest classification algorithm to map various land cover classes along the GCC coastline. …”