Search alternatives:
making algorithm » cosine algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
tree » three (Expand Search), free (Expand Search)
making algorithm » cosine algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
tree » three (Expand Search), free (Expand Search)
-
1
Intelligent Rapidly-Exploring Random Tree Star Algorithm
Published 2024Get full text
doctoralThesis -
2
-
3
Exploring the Impact of Explainable Artificial Intelligence on Decision-making in Healthcare
Published 2023“…The study analyses the benefits and limitations of applying XAI in healthcare decision-making processes through an exhaustive analysis of current literature and empirical data. …”
Get full text
-
4
CNN and HEVC Video Coding Features for Static Video Summarization
Published 2022Get full text
article -
5
-
6
-
7
-
8
On Higher-Order Iterative Learning Control Algorithm in Presence of Measurement Noise
Published 2005Get full text
Get full text
Get full text
Get full text
conferenceObject -
9
-
10
Approximate XML structure validation based on document–grammar tree similarity
Published 2015“…Our approach exploits the concept of tree edit distance, introducing a novel edit distance recurrence and dedicated algorithms to effectively compare XML documents and grammar structures, modeled as ordered labeled trees. …”
Get full text
Get full text
Get full text
Get full text
article -
11
Metallic coating thickness assessment over nonmagnetic metals using eddy current technology
Published 2019Get full text
doctoralThesis -
12
-
13
Automatic Video Summarization Using HEVC and CNN Features
Published 2022Get full text
doctoralThesis -
14
-
15
Adaptive bias simulated evolution algorithm for placement
Published 2001“…In this work, we propose an adaptive bias scheme which adjusts automatically to the quality of solution and makes the algorithm independent of the problem class or instance, as well as any user defined value. …”
Get full text
Get full text
article -
16
Artificial intelligence based anomaly detection of energy consumption in buildings: A review, current trends and new perspectives
Published 2021“…Specifically, an extensive survey is presented, in which a comprehensive taxonomy is introduced to classify existing algorithms based on different modules and parameters adopted, such as machine learning algorithms, feature extraction approaches, anomaly detection levels, computing platforms and application scenarios. …”
-
17
Improved search-tree algorithms for the cluster edit problem. (c2011)
Published 2011Get full text
Get full text
masterThesis -
18
-
19
Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT
Published 2021“…It is mainly due to a single authentication factor, and the poor adaptation to regular increases in the number of users and different requirements that make the current authentication mechanism suffer a lot in IIoT. …”
-
20
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
Published 2022“…Through numerical simulations, we observed that the proposed strategy outperformed the next-best current methodology by 5.561 percent in terms of PSNR Correlation score. …”