Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
best algorithm » deer algorithm (Expand Search)
experiments » experimental (Expand Search)
element » elements (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
best algorithm » deer algorithm (Expand Search)
experiments » experimental (Expand Search)
element » elements (Expand Search)
-
141
Regression Testing of Database Applications
Published 2002“…In phase 2, further reduction in the regression test cases is performed by using reduction algorithms. We present two such algorithms. The Graph Walk algorithm walks through the control flow graph of database modules and selects a safe set of test cases to retest. …”
Get full text
Get full text
Get full text
article -
142
Condenser capacity and hyperbolic perimeter
Published 2022“…<p dir="ltr">We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
-
143
Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images
Published 2023“…Lung-EffNet is evaluated by utilizing five variants of EfficientNet i.e., B0–B4. The experiments are conducted on the benchmark dataset “IQ-OTH/NCCD” for lung cancer patients grouped as benign, malignant, or normal based on the presence or absence of lung cancer. …”
-
144
Real-Time Smart-Digital Stethoscope System for Heart Diseases Monitoring
Published 2019“…The cost-adjusted optimized ensemble algorithm can produce 97% and 88% accuracy of classifying abnormal and normal HS, respectively.…”
-
145
Oversampling techniques for imbalanced data in regression
Published 2024“…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …”
-
146
Blockchain-Based Decentralized Architecture for Software Version Control
Published 2023“…The proof of authority (PoA) consensus algorithm will be used to approve the developer communicating modifications to the private blockchain network; the authority will only provide permission and will not be able to add, edit, or delete code files. …”
-
147
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
148
Diagnosing failed distribution transformers using neural networks
Published 2001“…An artificial neural networks (ANN) system was developed for distribution transformer's failure diagnosis. The diagnosis was based on the latest standards and expert experiences in this field. …”
Get full text
Get full text
article -
149
Using Text Mining and Clustering Techniques on Tweets to Discover Trending Topics in Dubai
Published 2015“…In the end, an experiment was conducted over datasets collected from different timeframes to see what are the constant hot topics discussed in Twitter about Dubai. …”
Get full text
-
150
SemIndex: Semantic-Aware Inverted Index
Published 2017“…We also provide an extended query model and related processing algorithms with the help of SemIndex. To investigate its effectiveness, we set up experiments to test the performance of SemIndex. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
151
Guidance, Control and Trajectory Tracking of Small Fixed Wing Unmanned Aerial Vehicles (UAV's)
Published 2009Get full text
doctoralThesis -
152
An XML Document Comparison Framework
Published 2001“…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
Get full text
Get full text
Get full text
article -
153
Internal Model Control Structure Using Adaptive Inverse Control Strategy
Published 2003“…The internal model of the plant is estimated by recursive least square algorithm and the inverse of the system by least mean square. …”
Get full text
Get full text
article -
154
(k, l)-Clustering for Transactional Data Streams Anonymization
Published 2018Get full text
Get full text
Get full text
Get full text
conferenceObject -
155
Full-fledged semantic indexing and querying model designed for seamless integration in legacy RDBMS
Published 2018“…We then provide a general keyword query model with specially tailored query processing algorithms built on top of SemIndex, in order to produce semantic-aware results, allowing the user to choose the results' semantic coverage and expressiveness based on her needs. …”
Get full text
Get full text
Get full text
Get full text
article -
156
Decision-level Gait Fusion for Human Identification at a Distance
Published 2014Get full text
doctoralThesis -
157
Approximate XML structure validation technical report
Published 2014“…We implemented a prototype and conducted several experiments on large sets of real and synthetic XML documents and grammars. …”
Get full text
Get full text
Get full text
article -
158
-
159
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
Published 2021“…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …”
Get full text
-
160