Search alternatives:
method algorithm » mould algorithm (Expand Search)
mean algorithm » deer algorithm (Expand Search), search algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
mean algorithm » deer algorithm (Expand Search), search algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
-
461
Design of A Theoretical Framework For A Real-Time Fire Evacuation Guidance System
Published 2020Get full text
doctoralThesis -
462
An XML Document Comparison Framework
Published 2001“…A prototype has been developed to evaluate the optimality and performance of our method. Results demonstrate higher comparison accuracy with respect to alternative XML comparison methods, while timing experiments reflect the significant impact of semantic similarity assessment on overall system performance.…”
Get full text
Get full text
Get full text
article -
463
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
Published 2015“…First, our approach resolves the complexity of policies by elaborating an intermediate set-based representation to which the elements of XACML are automatically converted. Second, it allows to detect flaws, conflicts and redundancies between rules by offering new mechanisms to analyze the meaning of policy rules through semantics verification by inference rule structure and deductive logic. …”
Get full text
Get full text
Get full text
article -
464
-
465
Prototype project management tool (PPMT) with cocomo calibration. (c1998)
Published 1998Get full text
Get full text
masterThesis -
466
Developing a framework for using face recognition in transit payment transactions
Published 2021“…This solution considers an effective cost-based solution. The second solution is proposed based on implementing a dedicated full HD face recognition stereo camera system on top of each metro gate and integrate it with the recommended “Banking Payment Context- Account Based Ticketing System” by using the MFcoface face recognition method which results from the systematic literature review and experts’ outcomes. …”
Get full text
-
467
Failure recovery in wireless content distribution networks with device-to-device cooperation
Published 2017“…We present low complexity effective algorithms based on clustering and tree construction methods in order to address three different types of dynamic node behavior, namely new devices joining the network, existing devices leaving the network, and existing devices moving locally within the network. …”
Get full text
Get full text
Get full text
Get full text
article -
468
A modified coronavirus herd immunity optimizer for capacitated vehicle routing problem
Published 2021“…Due to the complex nature of the capacitated vehicle routingproblem, metaheuristic optimization algorithms are widely used for tackling this type of challenge.Coronavirus Herd Immunity Optimizer (CHIO) is a recent metaheuristic population-based algorithm thatmimics the COVID-19 herd immunity treatment strategy. …”
Get full text
-
469
Deep Neural Networks for Electromagnetic Inverse Scattering Problems in Microwave Imaging
Published 2023Get full text
doctoralThesis -
470
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
Published 2007“…To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …”
Get full text
Get full text
Get full text
article -
471
Tailoring motivational health messages for smoking cessation using an mHealth recommender system integrated with an electronic health record: a study protocol
Published 2018“…Health recommender systems are information-filtering algorithms that can choose the most relevant health-related items—for instance, motivational messages aimed at smoking cessation—for each user based on his or her profile. …”
-
472
Approximate XML structure validation technical report
Published 2014“…Our method also inherently performs exact validation by imposing a maximum similarity threshold (minimum edit distance) on the returned results. …”
Get full text
Get full text
Get full text
article -
473
-
474
Prediction of Multiple Clinical Complications in Cancer Patients to Ensure Hospital Preparedness and Improved Cancer Care
Published 2022“…Other highlights are (1) a novel set of easily available features for the prediction of the aforementioned clinical complications and (2) the use of data augmentation methods and model-scoring-based hyperparameter tuning to address the problem of class disproportionality, a common challenge in medical datasets and often the reason behind poor event prediction rate of various predictive models reported so far. …”
-
475
Isolating Physical Replacement of Identical IoT Devices Using Machine and Deep Learning Approaches
Published 2021Get full text
doctoralThesis -
476
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
477
Quality Degradation And Pricing of Perishable Food Products
Published 2024Get full text
doctoralThesis -
478
Single-channel speech denoising by masking the colored spectrograms
Published 2025“…Similarly, it offers an improvement of 1 % in STOI and a reduction of 33 and 200 times, respectively, in network size and training epochs when compared to a complex variational U-Net-based model. Also, with comparable PESQ, the proposed system offers almost 2 % improvement in STOI, and a 2 times reduction in network size and 100 times reduction in training epochs, when compared to a lightweight system using automatic dimension reduction of network layers by a structured pruning method.…”
-
479
MoveSchedule
Published 1995“…The resource levels describe different methods or crew-sizes for performing the activity. …”
Get full text
Get full text
Get full text
masterThesis -
480
Automated systems for diagnosis of dysgraphia in children: a survey and novel framework
Published 2024“…This work discusses the data collection method, important handwriting features, and machine learning algorithms employed in the literature for the diagnosis of dysgraphia. …”