Showing 141 - 160 results of 183 for search '(((( experiments based algorithm ) OR ( element best algorithm ))) OR ( level coding algorithm ))', query time: 0.10s Refine Results
  1. 141

    Regression Testing of Database Applications by Haraty, Ramzi A.

    Published 2002
    “…In phase 2, further reduction in the regression test cases is performed by using reduction algorithms. We present two such algorithms. The Graph Walk algorithm walks through the control flow graph of database modules and selects a safe set of test cases to retest. …”
    Get full text
    Get full text
    Get full text
    article
  2. 142

    Condenser capacity and hyperbolic perimeter by Mohamed M.S. Nasser (16931772)

    Published 2022
    “…<p dir="ltr">We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
  3. 143

    Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images by Rehan Raza (17019105)

    Published 2023
    “…Lung-EffNet is evaluated by utilizing five variants of EfficientNet i.e., B0–B4. The experiments are conducted on the benchmark dataset “IQ-OTH/NCCD” for lung cancer patients grouped as benign, malignant, or normal based on the presence or absence of lung cancer. …”
  4. 144

    Real-Time Smart-Digital Stethoscope System for Heart Diseases Monitoring by Muhammad E.H. Chowdhury (17151154)

    Published 2019
    “…The cost-adjusted optimized ensemble algorithm can produce 97% and 88% accuracy of classifying abnormal and normal HS, respectively.…”
  5. 145

    Oversampling techniques for imbalanced data in regression by Samir Brahim Belhaouari (9427347)

    Published 2024
    “…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …”
  6. 146

    Blockchain-Based Decentralized Architecture for Software Version Control by Muhammad Hammad (17541570)

    Published 2023
    “…The proof of authority (PoA) consensus algorithm will be used to approve the developer communicating modifications to the private blockchain network; the authority will only provide permission and will not be able to add, edit, or delete code files. …”
  7. 147

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
  8. 148

    Diagnosing failed distribution transformers using neural networks by Farag, A.S.

    Published 2001
    “…An artificial neural networks (ANN) system was developed for distribution transformer's failure diagnosis. The diagnosis was based on the latest standards and expert experiences in this field. …”
    Get full text
    Get full text
    article
  9. 149

    Using Text Mining and Clustering Techniques on Tweets to Discover Trending Topics in Dubai by Hamadeh, Moutaz Wajih

    Published 2015
    “…In the end, an experiment was conducted over datasets collected from different timeframes to see what are the constant hot topics discussed in Twitter about Dubai. …”
    Get full text
  10. 150

    SemIndex: Semantic-Aware Inverted Index by Chbeir, Richard

    Published 2017
    “…We also provide an extended query model and related processing algorithms with the help of SemIndex. To investigate its effectiveness, we set up experiments to test the performance of SemIndex. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  11. 151
  12. 152

    An XML Document Comparison Framework by Tekli, Joe

    Published 2001
    “…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
    Get full text
    Get full text
    Get full text
    article
  13. 153

    Internal Model Control Structure Using Adaptive Inverse Control Strategy by Shafiq, M.Riyaz

    Published 2003
    “…The internal model of the plant is estimated by recursive least square algorithm and the inverse of the system by least mean square. …”
    Get full text
    Get full text
    article
  14. 154
  15. 155

    Full-fledged semantic indexing and querying model designed for seamless integration in legacy RDBMS by Tekli, Joe

    Published 2018
    “…We then provide a general keyword query model with specially tailored query processing algorithms built on top of SemIndex, in order to produce semantic-aware results, allowing the user to choose the results' semantic coverage and expressiveness based on her needs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  16. 156
  17. 157

    Approximate XML structure validation technical report by Tekli, Joe

    Published 2014
    “…We implemented a prototype and conducted several experiments on large sets of real and synthetic XML documents and grammars. …”
    Get full text
    Get full text
    Get full text
    article
  18. 158
  19. 159

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures by JUMA, MAZEN GHAZI

    Published 2021
    “…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …”
    Get full text
  20. 160