Search alternatives:
world implementation » its implementation (Expand Search)
proof implementation » broader implementation (Expand Search), its implementation (Expand Search), programme implementation (Expand Search)
_ implementation » implementation _ (Expand Search)
world implementation » its implementation (Expand Search)
proof implementation » broader implementation (Expand Search), its implementation (Expand Search), programme implementation (Expand Search)
_ implementation » implementation _ (Expand Search)
-
1
-
2
On the Generation of Quantified Lemmas
Published 2018“…Moreover, the paper contains a comprehensive empirical evaluation of the implemented method and gives an application to a mathematical proof.…”
-
3
DeMi: A Solution to Detect and Mitigate DoS Attacks in SDN
Published 2023“…The proposed solution for detection leverages a sample entropy approach coupled with an adaptive dynamic threshold considering an exponentially weighted moving average (EWMA); the mitigation approach is based on proof of work (PoW) combined with flow rule installations; and, the heavy-load management method implements a scheduling approach at the SDN controller. …”
-
4
A study on Speaker Recognition System
Published 2015“…The proposed system was mainly developed using Python (Python.org, 2015). This system was used to implement and study several methods and techniques in speaker recognition domain. …”
Get full text
-
5
Dickson polynomial-based secure group authentication scheme for Internet of Things
Published 2024“…Implementation has been carried using python language and deployed and tested on Blockchain using Ethereum Goerli’s Testnet framework. …”
-
6
Arabic Educational Neural Network Chatbot
Published 2023“…Finally, we programmed the chabot and the models in Python. As a consequence, an Arabic chatbot answers all questions about educational regulations in the United Arab Emirates.…”
Get full text
Get full text
-
7
Exploring the potential of onboard energy scavenging subsystems for generating valuable data
Published 2023“…<p dir="ltr">We propose implementing an onboard energy scavenging subsystem utilizing piezoelectric materials, which serves the dual purpose of generating electrical energy and facilitating data acquisition for multifaceted applications. …”
-
8
Hybrid Model for Detection of Cervical Cancer Using Causal Analysis and Machine Learning Techniques
Published 2022“…The proposed model Boruta with SVM and various popular ML models are implemented using Python and various performance measuring parameters, i.e., accuracy, precision, F 1 – Score , and recall. …”
-
9
Binary Classification of 3D Small-Scale Medical Images Using Video Vision Transformers
Published 2025“…Previous studies have demonstrated a plethora of methods in treating 3D images, increasing the interest in applying ViTs models from scratch to that data modality, specifically in small-scale datasets. …”
Get full text
Get full text
Get full text
masterThesis -
10
Novel Federated Decision Making for Distribution of Anti-SARS-CoV-2 Monoclonal Antibody to Eligible High-Risk Patients
Published 2022“…For proof of concept, three hospitals with 16 patients each are enrolled. …”
Get full text
Get full text
-
11
Federal Multi Criteria Decision Making Framework in Distribution of Anti-SARS-CoV-2 Monoclonal Antibody to Eligible High-Risk Patients as Case Study
Published 2022“…For proof of concept, three hospitals with 16 patients each are enrolled. …”
Get full text
-
12
Approximate XML structure validation technical report
Published 2014“…This technical report contains only proofs, computation examples, and several experimental results.…”
Get full text
Get full text
Get full text
article -
13
Global burden and strength of evidence for 88 risk factors in 204 countries and 811 subnational locations, 1990–2021: a systematic analysis for the Global Burden of Disease Study 2...
Published 2024“…To complement estimates of RR and attributable burden, newly developed burden of proof risk function (BPRF) methods were applied to yield supplementary, conservative interpretations of risk–outcome associations based on the consistency of underlying evidence, accounting for unexplained heterogeneity between input data from different studies. …”
Get full text
Get full text
Get full text
article