Search alternatives:
custom algorithm » control algorithm (Expand Search), auction algorithm (Expand Search), cosine algorithm (Expand Search)
making algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data making » data mining (Expand Search)
custom algorithm » control algorithm (Expand Search), auction algorithm (Expand Search), cosine algorithm (Expand Search)
making algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data making » data mining (Expand Search)
-
361
CubeSat Communication Subsystems: A Review of On-Board Transceiver Architectures, Protocols, and Performance
Published 2023“…The reliability, performance, data rate, and power consumption of the reviewed systems are critically compared and evaluated to understand the limitations of existing CubeSat transceivers and identify directions of future developments. …”
-
362
An XML Document Comparison Framework
Published 2001“…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
Get full text
Get full text
Get full text
article -
363
A novel XML document structure comparison framework based-on sub-tree commonalities and label semantics
Published 2011“…XML similarity evaluation has become a central issue in the database and information communities, its applications ranging over document clustering, version control, data integration and ranked retrieval. Various algorithms for comparing hierarchically structured data, XML documents in particular, have been proposed in the literature. …”
Get full text
Get full text
Get full text
Get full text
article -
364
An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation
Published 2001“…Sequential circuit test generation using deterministic, fault-oriented algorithms is highly complex and time consuming. …”
Get full text
article -
365
An evolutionary meta-heuristic for state justification insequential automatic test pattern generation
Published 2001“…Sequential circuit test generation using deterministic, fault-oriented algorithms is highly complex and time consuming. …”
Get full text
Get full text
article -
366
LDSVM: Leukemia Cancer Classification Using Machine Learning
Published 2022“…Currently, it is difficult to classify cancers using microarray data. Nearly many data mining techniques have failed because of the small sample size, which has become more critical for organizations. …”
-
367
Efficient XML Structural Similarity Detection using Sub-tree Commonalities
Published 2007“…Developing efficient techniques for comparing XML-based documents becomes essential in the database and information retrieval communities. Various algorithms for comparing hierarchically structured data, e.g. …”
Get full text
Get full text
conferenceObject -
368
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
Published 2021“…Its security has been verified formally using Random Oracle Model (ROM), ProVerif2.02 and informally using assumptions and pragmatic illustration. …”
-
369
Dynamic single node failure recovery in distributed storage systems
Published 2017“…To minimize the system repair cost, we formulate our problem using incidence matrices and solve it heuristically using genetic algorithms for all possible cases of single node failures. …”
Get full text
Get full text
Get full text
Get full text
article -
370
-
371
Modelling of pollutant transport in compound open channels
Published 1998“…Longitudinal and transverse mixing coefficients were calculated using the method of moments and by estimation using empirical relationships. …”
Get full text
Get full text
masterThesis -
372
Reliability and fault tolerance based topological optimization of computer networks - part II: iterative techniques
Published 2003“…We consider fault-tolerance to be an important network design aspect. We consider the use of three iterative techniques, namely tabu search, simulated annealing, and genetic algorithms, in solving the multiobjective topological optimization network design problem. …”
Get full text
Get full text
article -
373
-
374
-
375
Optimal Trajectory and Positioning of UAVs for Small Cell HetNets: Geometrical Analysis and Reinforcement Learning Approach
Published 2023“…We then formulate the problem for UAV trajectory to minimize the maximum outage probability (OP) of directional THz links. Then, using geometrical analysis and deep reinforcement learning (RL) method, we propose several algorithms to find the optimal trajectory and select an optimal pattern during the trajectory. …”
-
376
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…In this paper, we describe a new approach for XML keyword search aiming to solve the limitations mentioned above. Our solution first transforms the XML document collection (offline) and the keyword query (on-the-fly) into meaningful semantic representations using context-based and global disambiguation methods, specially designed to allow almost linear computation efficiency. …”
Get full text
Get full text
Get full text
Get full text
article -
377
Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study
Published 2023“…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …”
-
378
Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases
Published 2024“…These AI algorithms are effective non-invasive biomarkers for cardiovascular illnesses because they can identify subtle patterns and signals in the ECG that may not be readily apparent to human interpreters. …”
-
379
-
380
On the complexity of various parameterizations of common induced subgraph isomorphism
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject