Search alternatives:
mean algorithm » deer algorithm (Expand Search), search algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
element » elements (Expand Search)
backing » banking (Expand Search), lacking (Expand Search), packing (Expand Search)
mean algorithm » deer algorithm (Expand Search), search algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
element » elements (Expand Search)
backing » banking (Expand Search), lacking (Expand Search), packing (Expand Search)
-
61
Neural network-based failure rate prediction for De Havilland Dash-8 tires
Published 2006“…An artificial neural network (ANN) model for predicting the failure rate of De Havilland Dash-8 airplane tires utilizing the twolayered feed-forward back-propagation algorithm as a learning rule is developed. …”
Get full text
article -
62
NEURAL NETWORK MODEL FOR PLANNED REPLACEMENT OF BOEING 737 BRAKES
Published 2020“…One-layered feed-forward back-propagation algorithm for artificial neural network whereas three parameters model for Weibull are used for the analysis. …”
Get full text
article -
63
Failure-Rate Prediction for De Havilland Dash-8 Tires Employing Neural-Network Technique
Published 2006“…An artificial neural-network model for predicting the failure rate of De Havilland Dash-8 airplane tires utilizing the two-layered feedforward back-propagation algorithm as a learning rule is developed. …”
Get full text
article -
64
FAILURE RATE ANALYSIS OF BOEING 737 BRAKES EMPLOYING NEURAL NETWORK
Published 2007“…One-layered feed-forward back-propagation algorithm for artificial neural network whereas three parameters model for Weibull are used for the analysis. …”
Get full text
article -
65
Design and analysis of entropy-constrained reflected residual vector quantization
Published 2002“…Jointly optimized RVQ (JORVQ) is an effective design algorithm for minimizing the overall quantization error. …”
Get full text
Get full text
article -
66
Solar power forecasting beneath diverse weather conditions using GD and LM-artificial neural networks
Published 2023“…A case study has been done in the Peer Panjal region. The data collected for four months with various parameters have been applied randomly as input data using GD and LM type of artificial neural network compared to actual solar energy data. …”
Get full text
-
67
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
Published 2021“…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …”
-
68
Role of authentication factors in Fin-tech mobile transaction security
Published 2023“…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…”
-
69
Developing an online hate classifier for multiple social media platforms
Published 2020“…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …”
-
70
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
Published 2019“…Despite having different performance results on predicting failures, most of the models produced close outcomes. Meaning no “perfect” machine learning algorithm that will produce good results at particular problem, in fact for each type of problem a specific algorithm is suited and might achieves good outcome, while another algorithm fails heavily. …”
Get full text
-
71
Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers
Published 2023“…The DT is trained offline using a set of experimental data and updated online to get the maximum possible accuracy. …”
-
72
Structural similarity evaluation between XML documents and DTDs
Published 2007“…We consider the various DTD operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes. Our approach is based on the concept of tree edit distance, as an effective and efficient means for comparing tree structures, XML documents and DTDs being modeled as ordered labeled trees. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
73
Dynamic single node failure recovery in distributed storage systems
Published 2017“…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …”
Get full text
Get full text
Get full text
Get full text
article -
74
Efficient Seismic Volume Compression using the Lifting Scheme
Published 2000“…In addition, the lifting scheme offers: 1) a dramatic reduction of the required auxiliary memory, 2) an efficient combination with parallel rendering algorithms to perform arbitrary surface and volume rendering for interactive visualization, and 3) an easy integration in the parallel I/O seismic data loading routines. …”
Get full text
article -
75
CubeSat Communication Subsystems: A Review of On-Board Transceiver Architectures, Protocols, and Performance
Published 2023“…Nevertheless, several directions for improvements are proposed such as the use of improved channel coding algorithms, Field Programmable Gate Arrays (FPGAs), beamforming, advanced antennas, deployable solar panels, and transition to higher frequency bands. …”
-
76
Comprehensive whole genome sequence analyses yields novel genetic and structural insights for Intellectual Disability
Published 2017“…The <i>de novo</i> assembly resulted in unmasking hidden genome instability that was missed by standard re-alignment based algorithms. We also interrogated regulatory sequence variation for known and hypothesized ID genes and present useful strategies for WGS data analyses for non-coding variation.…”
-
77
Using artificial bee colony to optimize software quality estimation models. (c2015)
Published 2016“…We compare our models to others constructed using other well established techniques such as C4.5, Genetic Algorithms, Simulated Annealing, Tabu Search, multi-layer perceptron with back-propagation, multi-layer perceptron hybridized with ABC and the majority classifier. …”
Get full text
Get full text
masterThesis -
78
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
Published 2015“…First, our approach resolves the complexity of policies by elaborating an intermediate set-based representation to which the elements of XACML are automatically converted. Second, it allows to detect flaws, conflicts and redundancies between rules by offering new mechanisms to analyze the meaning of policy rules through semantics verification by inference rule structure and deductive logic. …”
Get full text
Get full text
Get full text
article