Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
ree algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search)
elements ree » elements _ (Expand Search), elementi per (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
ree algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search)
elements ree » elements _ (Expand Search), elementi per (Expand Search)
-
121
Learning Spatiotemporal Latent Factors of Traffic via Regularized Tensor Factorization: Imputing Missing Values and Forecasting
Published 2019“…The learned factors, with a graph-based temporal dependency, are then used in an autoregressive algorithm to predict the future state of the road network with a large horizon. …”
-
122
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
Published 2019“…Therefore, for this paper multiple machine learning algorithms are investigated to predict system failure based on vehicle trips information as well as maintenance management historical data including preventive maintenance and corrective maintenance. …”
Get full text
-
123
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
Published 2010“…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
Get full text
-
124
Fast Methods Fbr Split Codebooks
Published 2020“…The paper presents algorithms for the generation of the SFC mapping utilizing the self-replication feature of the curves, and a number of simulation experiments to demonstrate the effectiveness of the method. …”
Get full text
article -
125
Efficient XML Structural Similarity Detection using Sub-tree Commonalities
Published 2007“…Various algorithms for comparing hierarchically structured data, e.g. …”
Get full text
Get full text
conferenceObject -
126
Iterative heuristics for multiobjective VLSI standard cellplacement
Published 2001“…We employ two iterative heuristics for the optimization of VLSI standard cell placement. These heuristics are based on genetic algorithms (GA) and tabu search (TS) respectively. …”
Get full text
Get full text
article -
127
Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model
Published 2024“…The performance level improvements are practically summarized in both the transmission and reception entities with the help of the proposed hybrid network architecture and the associated Dual Deep Network algorithm. …”
-
128
Impact Of Multidisciplinary Maternal Resuscitation Training Program on Improving the Front-Line Care Provider’s Readiness to Manage Maternal Cardiac Arrest: A Pre-test/Post-test St...
Published 2024“…The multidisciplinary resuscitation teams were observed during the cardiac arrest mock drills both before and after conducting the multidisciplinary resuscitation simulation-based training program and the introduction of the maternal resuscitation algorithm pathway against seven KPIs. …”
-
129
Modelling of pollutant transport in compound open channels
Published 1998“…Derivation of the basic differential equations is based on the Navier-Stokes equations of continuity and fluid motion, in addition to the convection-dispersion equation. …”
Get full text
Get full text
masterThesis -
130
Condenser capacity and hyperbolic perimeterImage 1
Published 2021“…We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
Get full text
Get full text
Get full text
article -
131
Regression Testing of Database Applications
Published 2002“…In phase 2, further reduction in the regression test cases is performed by using reduction algorithms. We present two such algorithms. The Graph Walk algorithm walks through the control flow graph of database modules and selects a safe set of test cases to retest. …”
Get full text
Get full text
Get full text
article -
132
Condenser capacity and hyperbolic perimeter
Published 2022“…<p dir="ltr">We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
-
133
Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images
Published 2023“…Lung-EffNet is evaluated by utilizing five variants of EfficientNet i.e., B0–B4. The experiments are conducted on the benchmark dataset “IQ-OTH/NCCD” for lung cancer patients grouped as benign, malignant, or normal based on the presence or absence of lung cancer. …”
-
134
Real-Time Smart-Digital Stethoscope System for Heart Diseases Monitoring
Published 2019“…The cost-adjusted optimized ensemble algorithm can produce 97% and 88% accuracy of classifying abnormal and normal HS, respectively.…”
-
135
Oversampling techniques for imbalanced data in regression
Published 2024“…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …”
-
136
Blockchain-Based Decentralized Architecture for Software Version Control
Published 2023“…The proof of authority (PoA) consensus algorithm will be used to approve the developer communicating modifications to the private blockchain network; the authority will only provide permission and will not be able to add, edit, or delete code files. …”
-
137
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
138
Diagnosing failed distribution transformers using neural networks
Published 2001“…An artificial neural networks (ANN) system was developed for distribution transformer's failure diagnosis. The diagnosis was based on the latest standards and expert experiences in this field. …”
Get full text
Get full text
article -
139
Using Text Mining and Clustering Techniques on Tweets to Discover Trending Topics in Dubai
Published 2015“…In the end, an experiment was conducted over datasets collected from different timeframes to see what are the constant hot topics discussed in Twitter about Dubai. …”
Get full text
-
140
SemIndex: Semantic-Aware Inverted Index
Published 2017“…We also provide an extended query model and related processing algorithms with the help of SemIndex. To investigate its effectiveness, we set up experiments to test the performance of SemIndex. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject