Search alternatives:
making algorithm » cosine algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
elements rd » elements _ (Expand Search)
making algorithm » cosine algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
elements rd » elements _ (Expand Search)
-
41
Stochastic management of hybrid AC/DC microgrids considering electric vehicles charging demands
Published 2020“…A novel evolving solution based on flower pollination algorithm is also proposed to solve the problem optimally. …”
Get full text
Get full text
Get full text
article -
42
-
43
A parallel search tree algorithm for vertex cover on graphical processing units. (c2013)
Published 2013Get full text
Get full text
masterThesis -
44
Evaluation of C-arm CT metal artifact reduction algorithm during intra-aneurysmal coil embolization
Published 2016“…The main purpose of this paper is to systematically evaluate the accuracy of one such C-arm CT based metal artifact reduction (MAR) algorithm and to demonstrate its usage in both stent and flow diverter assisted coil embolization procedures. …”
Get full text
Get full text
Get full text
Get full text
article -
45
Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators
Published 2021“…The outcomes of the DNA microarray is a table/matrix, called gene expression data. Pattern recognition algorithms are widely applied to gene expression data to differentiate between health and cancerous patient samples. …”
Get full text
-
46
-
47
Predicting insulin dosage for diabetic patients to reach optimal glucose levels. (c2012)
Published 2012Get full text
Get full text
masterThesis -
48
A localized navigation algorithm for radiation evasion for nuclear facilities: Optimizing the "Radiation Evasion" criterion: Part I
Published 2013“…When used to navigate based on local radiation information, the algorithm will behave more reliably when accidents happen, since no long-haul communication links are required for information exchange. …”
Get full text
article -
49
Molecular Classification of Breast Cancer Utilizing Long Non-Coding RNA (lncRNA) Transcriptomes Identifies Novel Diagnostic lncRNA Panel for Triple-Negative Breast Cancer
Published 2021“…The identification of long non-coding RNAs (lncRNAs) and the roles they play in cancer progression has recently proven to be beneficial. …”
-
50
New Hardware Algorithms and Designs for Montgomery Modular Inverse Computation in Galois Fields GF(p) and GF(2n)
Published 2002“…We compare all scalable designs with fully parallel ones based on the same basic inversion algorithm. All scalable designs consumed less area and in general showed better performance than the fully parallel ones, which makes the scalable design a very efficient solution for computing the long precision Montgomery inverse.…”
Get full text
Get full text
masterThesis -
51
Logistics Optimization Using Hybrid Genetic Algorithm (HGA): A Solution to the Vehicle Routing Problem With Time Windows (VRPTW)
Published 2024“…Experimental findings validate that HGA-SIH consistently delivers results on par with or surpasses those obtained by several cutting-edge algorithms when evaluated based on various solution quality metrics. …”
-
52
-
53
-
54
Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT
Published 2021“…Additionally, by introducing the authentication mechanism based on transfer learning, blockchains can enhance the preservation and security standards for industrial applications. …”
-
55
-
56
Improving Rule Set Based Software Quality Prediction
Published 2003Get full text
Get full text
article -
57
Learning-Based Spectrum Sensing and Access for Cognitive Radio Systems
Published 2015Get full text
doctoralThesis -
58
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
Published 2022“…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. In this paper, we proposed a novel technique in steganography within the digital images such is RGB, Gray Scale, Texture, Aerial images to achieve higher security, imperceptibility, capacity, and robustness as compared with existing methods. …”
-
59
Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform
Published 2022“…Furthermore, to assess the overhead of the proposed privacy algorithms on the trading execution time, we conduct several experiments considering different anonymity levels <i>k</i> . …”
-
60
Practical Multiple Node Failure Recovery in Distributed Storage Systems
Published 2016“…The fractional repetition (FR) code is a class of regenerating codes that consists of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject