Search alternatives:
testing algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
testing algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
-
721
New Dimensions for Physical Layer Secret Key Generation: Excursion Lengths-Based Key Generation
Published 2024“…Level-crossing algorithms are lossy and extract a secret key from the central samples of matched excursions between the legitimate nodes. …”
-
722
-
723
Systems biology analysis reveals NFAT5 as a novel biomarker and master regulator of inflammatory breast cancer
Published 2015“…</p><h3>Methods</h3><p dir="ltr">In-silico modeling and Algorithm for the Reconstruction of Accurate Cellular Networks (ARACNe) on IBC/non-IBC (nIBC) gene expression data (n = 197) was employed to identify novel master regulators connected to the IBC phenotype. …”
-
724
Failure recovery in wireless content distribution networks with device-to-device cooperation
Published 2017“…We present results for various network scenarios using simulations and experimental test bed to demonstrate the effectiveness of the proposed algorithms in terms of performance efficiency, computational complexity, and practical implementation feasibility.…”
Get full text
Get full text
Get full text
Get full text
article -
725
Enhanced leaf model vs. original MLC modeling in Eclipse TPS: impact on planning deliverability accuracy
Published 2026“…For the 6 mm sweeping gap test, discrepancies reduced from 1.19% to 0.31% for 6MV. …”
-
726
An easy-to-use scalable framework for parallel recursive backtracking
Published 2013“…The key idea behind this framework is the use of an indexed search tree approach that is oblivious to the problem being solved. We test our framework with parallel implementations of algorithms for the well-known Vertex Cover and Dominating Set problems. …”
Get full text
Get full text
Get full text
article -
727
Axes-Based Encryption Key
Published 2018“…For this, a need of robust security systems is raised to ensure that our data will be kept safe. This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
728
Automated quantification of penile curvature using artificial intelligence
Published 2022“…The penile model images were captured using a smartphone camera and used to train and test a Yolov5 model that automatically cropped the penile area from each image. …”
-
729
Resilience analytics: coverage and robustness in multi-modal transportation networks
Published 2018“…In this work, we propose MUME, an efficient algorithm for Multi-modal Urban Mobility Estimation, that takes advantage of the special structure of the supra-Laplacian matrix of the transportation multiplex, to compute the coverage of the system. …”
-
730
Full-fledged semantic indexing and querying model designed for seamless integration in legacy RDBMS
Published 2018“…In the past decade, there has been an increasing need for semantic-aware data search and indexing in textual (structured and NoSQL) databases, as full-text search systems became available to non-experts where users have no knowledge about the data being searched and often formulate query keywords which are different from those used by the authors in indexing relevant documents, thus producing noisy and sometimes irrelevant results. …”
Get full text
Get full text
Get full text
Get full text
article -
731
Mobile clinics routing in response to covid-19 outbreak: an intelligent hyperheuristic approach
Published 2022“…This paper implements and tests an intelligent variable neighbourhood search algorithm for MCRP.…”
Get full text
Get full text
Get full text
Get full text
article -
732
Nonlinear Friction Identification of A Linear Voice Coil DC Motor
Published 2015Get full text
doctoralThesis -
733
On scalable parallel recursive backtracking
Published 2015“…The key idea behind our approach is the use of efficient traversal operations on an indexed search tree that is oblivious to the problem being solved. We test our approach with parallel implementations of algorithms for the well-known Vertex Cover and Dominating Set problems. …”
Get full text
Get full text
Get full text
article -
734
A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications
Published 2011“…However, the computational as well as memory access requirements of compression algorithms could consume more energy than simply transmitting data uncompressed. …”
Get full text
Get full text
Get full text
article -
735
A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis
Published 2021“…Specifically, we used a clustering algorithm to group published articles based on the similarity of their abstracts to identify research hotspots and current research directions. …”
-
736
-
737
Privacy Preserving Cancellable Template Generation for Crypto-Biometric Authentication System
Published 2025“…The proposed methodology not only ensures the protection of biometric data in storage but also facilitates secure data retrieval for authentication purposes. …”
-
738
Determining the Factors Affecting the Boiling Heat Transfer Coefficient of Sintered Coated Porous Surfaces
Published 2021“…For example, if the wall superheat is dropped from the modeling parameters, the lowest prediction of R<sup>2</sup> (0.893) is achieved. …”
-
739
Applications of artificial intelligence in emergency and critical care diagnostics: a systematic review and meta-analysis
Published 2024“…<h3>Introduction</h3><p dir="ltr">Artificial intelligence has come to be the highlight in almost all fields of science. It uses various models and algorithms to detect patterns and specific findings to diagnose a disease with utmost accuracy. …”
-
740
Communication-Based Adaptive Overcurrent Protection for Distribution Systems with DistributedGenerators
Published 2012Get full text
doctoralThesis