Search alternatives:
testing algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data testing » data using (Expand Search)
testing algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data testing » data using (Expand Search)
-
321
Practical Multiple Node Failure Recovery in Distributed Storage Systems
Published 2016“…We allocate newcomers to nodes with minimal computations and without changing the original optimized plan. The problem is solved using genetic algorithms that search within the feasible solution space. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
322
Dynamic multiple node failure recovery in distributed storage systems
Published 2018“…The contribution of this paper is four-fold: i. we generate an optimized block distribution scheme that minimizes the total system repair cost of all dependent and independent multiple node failure scenarios; ii. we address the practical scenario of having newly arriving blocks and allocate those blocks to existing nodes without any modification to the original on-node block distribution; iii. we consider new-comer nodes and generate an updated optimized block distribution; iv. we consider optimized storage and recovery of blocks with varying priority using variable fractional repetition codes. The four problems are modeled using incidence matrices and solved heuristically. …”
Get full text
Get full text
Get full text
Get full text
article -
323
Bridge Structural Health Monitoring Using Mobile Sensor Networks
Published 2022Get full text
doctoralThesis -
324
Generic DFT approach for pattern sensitive faults in word-orientedmemories
Published 1996“…A novel design for testability (DFT) strategy allows efficient built-in self-testing (BIST) of WOMs. By proper selection of the memory array tiling scheme, it is possible to implement O(n) BIST algorithms which test WOMs for various types of neighbourhood pattern sensitive faults (NPSFs). …”
Get full text
Get full text
article -
325
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
Published 2019“…These random numbers were subjected to NIST-800-22 test which is the most widely accepted statistical test suite. …”
-
326
On Indefinite Quadratic Optimization over the Intersection of Balls and Linear Constraints
Published 2022“…To solve e-TRS, we use the alternating direction method of multipliers approach and a branch and bound algorithm. …”
-
327
Multi Agent Reinforcement Learning Approach for Autonomous Fleet Management
Published 2019Get full text
doctoralThesis -
328
-
329
Severity-Based Prioritized Processing of Packets with Application in VANETs
Published 2019“…Also, the proposed heuristic is tested against a non-prioritized processing algorithm that works using first come first served policy. …”
-
330
Investigating the Use of Machine Learning Models to Understand the Drugs Permeability Across Placenta
Published 2023“…<p dir="ltr">Owing to limited drug testing possibilities in pregnant population, the development of computational algorithms is crucial to predict the fate of drugs in the placental barrier; it could serve as an alternative to animal testing. …”
-
331
Geographical Area Network—Structural Health Monitoring Utility Computing Model
Published 2019“…Every gateway is routing the data to SHM-UCM servers running a geo-spatial patch health assessment and prediction algorithm. …”
-
332
Integrative toxicogenomics: Advancing precision medicine and toxicology through artificial intelligence and OMICs technology
Published 2023“…As personalized medicine and toxicogenomics involve huge data processing, AI can expedite this process by providing powerful data processing, analysis, and interpretation algorithms. …”
-
333
Topology and parameter estimation in power systems through inverter-based broadband stimulations
Published 2015“…It combines and correlates various measurements in order to obtain an accurate snapshot of the power network parameters. To test its capabilities, the performance of this algorithm is evaluated on a small-scale test system.…”
Get full text
Get full text
Get full text
Get full text
article -
334
-
335
The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions
Published 2022“…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
-
336
Resource Optimization for 3D Video SoftCast with Joint Texture/Depth Power Allocation
Published 2022“…In the power-distortion problem, to obtain a target distortion, the algorithm exhaustively solves the closed form of the power resource under a predefined upper-bound bandwidth. …”
-
337
Clustering Tweets to Discover Trending Topics about دبي (Dubai)
Published 2018“…One of these social networks is Twitter - a microblogging hub and rich environment of data. Scanning tweets online is a hard task and searching effortlessly to find intended topic from huge amount of data is also time consuming. …”
Get full text
-
338
A Blockchain Model for Secure Communications in Internet of Vehicles
Published 2021“…The simulation results demonstrated the good performance of the HPBC algorithm when implemented within the IoV environment.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
339
Real-Time Social Robot’s Responses to Undesired Interactions Between Children and their Surroundings
Published 2022“…Testing the best model with data acquired from children performing interactions with toys produced a promising performance for the shake and throw behaviours. …”
-
340
Final exams scheduling for univeristies. (c2001)
Published 2001Get full text
Get full text
masterThesis