Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
5a algorithm » rd algorithm (Expand Search), jaya algorithm (Expand Search), _ algorithms (Expand Search)
experiments » experimental (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
5a algorithm » rd algorithm (Expand Search), jaya algorithm (Expand Search), _ algorithms (Expand Search)
experiments » experimental (Expand Search)
-
121
Fast Methods Fbr Split Codebooks
Published 2020“…The paper presents algorithms for the generation of the SFC mapping utilizing the self-replication feature of the curves, and a number of simulation experiments to demonstrate the effectiveness of the method. …”
Get full text
article -
122
Efficient XML Structural Similarity Detection using Sub-tree Commonalities
Published 2007“…Various algorithms for comparing hierarchically structured data, e.g. …”
Get full text
Get full text
conferenceObject -
123
Iterative heuristics for multiobjective VLSI standard cellplacement
Published 2001“…We employ two iterative heuristics for the optimization of VLSI standard cell placement. These heuristics are based on genetic algorithms (GA) and tabu search (TS) respectively. …”
Get full text
Get full text
article -
124
Impact Of Multidisciplinary Maternal Resuscitation Training Program on Improving the Front-Line Care Provider’s Readiness to Manage Maternal Cardiac Arrest: A Pre-test/Post-test St...
Published 2024“…The multidisciplinary resuscitation teams were observed during the cardiac arrest mock drills both before and after conducting the multidisciplinary resuscitation simulation-based training program and the introduction of the maternal resuscitation algorithm pathway against seven KPIs. …”
-
125
Modelling of pollutant transport in compound open channels
Published 1998“…Derivation of the basic differential equations is based on the Navier-Stokes equations of continuity and fluid motion, in addition to the convection-dispersion equation. …”
Get full text
Get full text
masterThesis -
126
Condenser capacity and hyperbolic perimeterImage 1
Published 2021“…We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
Get full text
Get full text
Get full text
article -
127
Regression Testing of Database Applications
Published 2002“…In phase 2, further reduction in the regression test cases is performed by using reduction algorithms. We present two such algorithms. The Graph Walk algorithm walks through the control flow graph of database modules and selects a safe set of test cases to retest. …”
Get full text
Get full text
Get full text
article -
128
Developing an online hate classifier for multiple social media platforms
Published 2020“…To address this research gap, we collect a total of 197,566 comments from four platforms: YouTube, Reddit, Wikipedia, and Twitter, with 80% of the comments labeled as non-hateful and the remaining 20% labeled as hateful. We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …”
-
129
Condenser capacity and hyperbolic perimeter
Published 2022“…<p dir="ltr">We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
-
130
Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images
Published 2023“…Lung-EffNet is evaluated by utilizing five variants of EfficientNet i.e., B0–B4. The experiments are conducted on the benchmark dataset “IQ-OTH/NCCD” for lung cancer patients grouped as benign, malignant, or normal based on the presence or absence of lung cancer. …”
-
131
Real-Time Smart-Digital Stethoscope System for Heart Diseases Monitoring
Published 2019“…The cost-adjusted optimized ensemble algorithm can produce 97% and 88% accuracy of classifying abnormal and normal HS, respectively.…”
-
132
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
133
Diagnosing failed distribution transformers using neural networks
Published 2001“…An artificial neural networks (ANN) system was developed for distribution transformer's failure diagnosis. The diagnosis was based on the latest standards and expert experiences in this field. …”
Get full text
Get full text
article -
134
Using Text Mining and Clustering Techniques on Tweets to Discover Trending Topics in Dubai
Published 2015“…In the end, an experiment was conducted over datasets collected from different timeframes to see what are the constant hot topics discussed in Twitter about Dubai. …”
Get full text
-
135
SemIndex: Semantic-Aware Inverted Index
Published 2017“…We also provide an extended query model and related processing algorithms with the help of SemIndex. To investigate its effectiveness, we set up experiments to test the performance of SemIndex. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
136
Guidance, Control and Trajectory Tracking of Small Fixed Wing Unmanned Aerial Vehicles (UAV's)
Published 2009Get full text
doctoralThesis -
137
An XML Document Comparison Framework
Published 2001“…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
Get full text
Get full text
Get full text
article -
138
Internal Model Control Structure Using Adaptive Inverse Control Strategy
Published 2003“…The internal model of the plant is estimated by recursive least square algorithm and the inverse of the system by least mean square. …”
Get full text
Get full text
article -
139
(k, l)-Clustering for Transactional Data Streams Anonymization
Published 2018Get full text
Get full text
Get full text
Get full text
conferenceObject -
140
Full-fledged semantic indexing and querying model designed for seamless integration in legacy RDBMS
Published 2018“…We then provide a general keyword query model with specially tailored query processing algorithms built on top of SemIndex, in order to produce semantic-aware results, allowing the user to choose the results' semantic coverage and expressiveness based on her needs. …”
Get full text
Get full text
Get full text
Get full text
article