Search alternatives:
making algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
element » elements (Expand Search)
making algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
element » elements (Expand Search)
-
101
UML-based regression testing for OO software
Published 2010“…For the second phase, we present algorithms for detecting system level changes in the interaction overview diagram. …”
Get full text
Get full text
Get full text
article -
102
Improving the Secure Socket Layer Protocol by modifying its Authentication function
Published 2017“…This modification would use only double the time needed for the usual implementation of RSA with key size of 1024 bits.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
103
Applications of fast fourier transform in the integrity evaluation of deep foundations
Published 2016“…For this reason, states have implemented specific procedures to follow when performing inspections of deep foundations. …”
Get full text
Get full text
Get full text
Get full text
article -
104
Recent advances on artificial intelligence and learning techniques in cognitive radio networks
Published 2015“…This paper also discusses the cognitive radio implementation and the learning challenges foreseen in cognitive radio applications.…”
Get full text
Get full text
Get full text
Get full text
article -
105
Approximate XML structure validation based on document–grammar tree similarity
Published 2015“…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…”
Get full text
Get full text
Get full text
Get full text
article -
106
Approximate XML structure validation technical report
Published 2014“…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…”
Get full text
Get full text
Get full text
article -
107
Using artificial bee colony to optimize software quality estimation models. (c2015)
Published 2016“…In order to measure such software quality characteristics, we must wait until the software is implemented, tested and put to use for a certain amount of time. …”
Get full text
Get full text
masterThesis -
108
UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks
Published 2018“…Among the emerging markets, Internet of Things (IoT) use cases are standing out with the proliferation of a wide range of sensors that can be configured to continuously monitor and transmit data for intelligent processing and decision making. Devices in such scenarios are normally extremely energy-constrained and often exist in large numbers and can be located in hard-to-reach areas; the fact that necessitates the design and implementation of effective energy-aware data collection mechanisms. …”
Get full text
Get full text
Get full text
Get full text
article -
109
Assessment of Inventory and Transportation Collaboration in a Logistics Marketplace
Published 2020Get full text
doctoralThesis -
110
Developing a UAE-Based Disputes Prediction Model using Machine Learning
Published 2022Get full text
doctoralThesis -
111
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
Published 2024“…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …”
-
112
The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions
Published 2022“…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
-
113
Dynamic multiple node failure recovery in distributed storage systems
Published 2018“…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …”
Get full text
Get full text
Get full text
Get full text
article -
114
An efficient cache replacement strategy for the hybrid cache consistency approach
Published 2010“…Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. …”
Get full text
Get full text
Get full text
article -
115
After generative AI : preparing faculty to transform education, learning, and pedagogy
Published 2025“…Going beyond basic explanations, Hardey and Aad provide practical insights and implementation strategies that recognize the concerns and ethical challenges related to GAI, such as bias in algorithms, privacy issues, and the need for inclusivity. …”
Get full text
Get full text
Get full text
Get full text
bookPart -
116
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
Published 2017“…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …”
Get full text
Get full text
Get full text
article -
117
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
Published 2017“…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …”
Get full text
Get full text
Get full text
article -
118
Enhancing e-learning through AI: advanced techniques for optimizing student performance
Published 2024“…AI algorithms, known for their cognitive ability and capacity to learn, adapt, and make decisions, are employed to analyze and forecast student performance, thereby improving educational quality and outcomes. …”
-
119
-
120
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…Many efforts have been deployed by the IR community to extend freetext query processing toward semi-structured XML search. Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …”
Get full text
Get full text
Get full text
Get full text
article