Search alternatives:
method algorithm » mould algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
means algorithm » search algorithm (Expand Search)
element » elements (Expand Search)
method algorithm » mould algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
means algorithm » search algorithm (Expand Search)
element » elements (Expand Search)
-
61
Oversampling techniques for imbalanced data in regression
Published 2024“…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …”
-
62
Blockchain-Based Decentralized Architecture for Software Version Control
Published 2023“…The proof of authority (PoA) consensus algorithm will be used to approve the developer communicating modifications to the private blockchain network; the authority will only provide permission and will not be able to add, edit, or delete code files. …”
-
63
-
64
Localizing-ground Transmitters Using Airborne Antenna Array
Published 2020Get full text
doctoralThesis -
65
Supervised term-category feature weighting for improved text classification
Published 2022“…It requires appropriate features to describe the contents and meaning of text documents, and map them with their target categories. …”
Get full text
Get full text
Get full text
Get full text
article -
66
-
67
Using artificial bee colony to optimize software quality estimation models. (c2015)
Published 2016“…In order to measure such software quality characteristics, we must wait until the software is implemented, tested and put to use for a certain amount of time. …”
Get full text
Get full text
masterThesis -
68
Cross entropy error function in neural networks
Published 2002“…This paper applies artificial neural networks to forecast gasoline consumption. The ANN is implemented using the cross entropy error function in the training stage. …”
Get full text
Get full text
Get full text
conferenceObject -
69
An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation
Published 2001“…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …”
Get full text
article -
70
An evolutionary meta-heuristic for state justification insequential automatic test pattern generation
Published 2001“…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …”
Get full text
Get full text
article -
71
UML-based regression testing for OO software
Published 2010“…For the second phase, we present algorithms for detecting system level changes in the interaction overview diagram. …”
Get full text
Get full text
Get full text
article -
72
A machine learning approach for localization in cellular environments
Published 2018“…This constitutes an improvement of 41%, 45%, and 16%, respectively, over the WKNN-only algorithm.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
73
Approximate XML structure validation based on document–grammar tree similarity
Published 2015“…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…”
Get full text
Get full text
Get full text
Get full text
article -
74
Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks
Published 2022“…This study proposes an analytical method based on sequential quadratic programming (SQP) methodology coupled with a mean value analysis (MVA) algorithm to solve this NP-Hard problem. …”
-
75
Approximate XML structure validation technical report
Published 2014“…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…”
Get full text
Get full text
Get full text
article -
76
Towards secure and trusted AI in healthcare: A systematic review of emerging innovations and ethical challenges
Published 2025“…It made it possible for healthcare professionals to understand AI-driven recommendations, by this means increasing transparency and trust. Still, challenges in adversarial attacks, algorithmic bias, and variable regulatory frameworks remain strong. …”
-
77
Assessment of Inventory and Transportation Collaboration in a Logistics Marketplace
Published 2020Get full text
doctoralThesis -
78
Exploring New Parameters to Advance Surface Roughness Prediction in Grinding Processes for the Enhancement of Automated Machining
Published 2024“…Hence, the current study encompasses the utilization of a deep artificial neural network to forecast roughness. This implementation leverages an extensive dataset generated in a recent experimental study by the authors. …”
-
79
The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions
Published 2022“…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
-
80
Dynamic multiple node failure recovery in distributed storage systems
Published 2018“…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …”
Get full text
Get full text
Get full text
Get full text
article