Works matching IS 19994893 AND DT 2017 AND VI 10 AND IP 2
Results: 36
Bayesian and Classical Estimation of Stress-Strength Reliability for Inverse Weibull Lifetime Models.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 71, doi. 10.3390/a10020071
- By:
- Publication type:
- Article
Cross-Language Plagiarism Detection System Using Latent Semantic Analysis and Learning Vector Quantization.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 69, doi. 10.3390/a10020069
- By:
- Publication type:
- Article
Research on Misalignment Fault Isolation of Wind Turbines Based on the Mixed-Domain Features.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 67, doi. 10.3390/a10020067
- By:
- Publication type:
- Article
An Easily Understandable Grey Wolf Optimizer and Its Application to Fuzzy Controller Tuning.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 68, doi. 10.3390/a10020068
- By:
- Publication type:
- Article
An Improved Brain-Inspired Emotional Learning Algorithm for Fast Classification.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 70, doi. 10.3390/a10020070
- By:
- Publication type:
- Article
A New Approach to Image-Based Estimation of Food Volume.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 66, doi. 10.3390/a10020066
- By:
- Publication type:
- Article
Seismic Signal Compression Using Nonparametric Bayesian Dictionary Learning via Clustering.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 65, doi. 10.3390/a10020065
- By:
- Publication type:
- Article
Expanding the Applicability of Some High Order Househölder-Like Methods.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 64, doi. 10.3390/a10020064
- By:
- Publication type:
- Article
Development of Filtered Bispectrum for EEG Signal Feature Extraction in Automatic Emotion Recognition Using Artificial Neural Networks.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 63, doi. 10.3390/a10020063
- By:
- Publication type:
- Article
Influence Factors Analysis on the Modal Characteristics of Irregularly-Shaped Bridges Based on a Free-Interface Mode Synthesis Algorithm.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 62, doi. 10.3390/a10020062
- By:
- Publication type:
- Article
Design and Implementation of a Multi-Modal Biometric System for Company Access Control.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 61, doi. 10.3390/a10020061
- By:
- Publication type:
- Article
Correction: A No Reference Image Quality Assessment Metric Based on Visual Perception.
- Published in:
- 2017
- Publication type:
- Correction Notice
Contradiction Detection with Contradiction-Specific Word Embedding.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 59, doi. 10.3390/a10020059
- By:
- Publication type:
- Article
A Flexible Pattern-Matching Algorithm for Network Intrusion Detection Systems Using Multi-Core Processors.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 58, doi. 10.3390/a10020058
- By:
- Publication type:
- Article
A Prediction of Precipitation Data Based on Support Vector Machine and Particle Swarm Optimization (PSO-SVM) Algorithms.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 57, doi. 10.3390/a10020057
- By:
- Publication type:
- Article
Clustering Using an Improved Krill Herd Algorithm.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 56, doi. 10.3390/a10020056
- By:
- Publication type:
- Article
Erratum: Ahmad, F., et al. A Preconditioned Iterative Method for Solving Systems of Nonlinear Equations Having Unknown Multiplicity.
- Published in:
- 2017
- Publication type:
- Correction Notice
Extending the Applicability of the MMN-HSS Method for Solving Systems of Nonlinear Equations under Generalized Conditions.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 54, doi. 10.3390/a10020054
- By:
- Publication type:
- Article
Application of Gradient Descent Continuous Actor-Critic Algorithm for Bilateral Spot Electricity Market Modeling Considering Renewable Power Penetration.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 53, doi. 10.3390/a10020053
- By:
- Publication type:
- Article
Searchable Data Vault: Encrypted Queries in Secure Distributed Cloud Storage.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 52, doi. 10.3390/a10020052
- By:
- Publication type:
- Article
Adaptive Vector Quantization for Lossy Compression of Image Sequences.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 51, doi. 10.3390/a10020051
- By:
- Publication type:
- Article
Hierarchical Parallel Evaluation of a Hamming Code.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 50, doi. 10.3390/a10020050
- By:
- Publication type:
- Article
Multivariate Statistical Process Control Using Enhanced Bottleneck Neural Network.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 49, doi. 10.3390/a10020049
- By:
- Publication type:
- Article
Adaptive Mutation Dynamic Search Fireworks Algorithm.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 48, doi. 10.3390/a10020048
- By:
- Publication type:
- Article
Trust in the Balance: Data Protection Laws as Tools for Privacy and Security in the Cloud.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 47, doi. 10.3390/a10020047
- By:
- Publication type:
- Article
An Improved Multiobjective Particle Swarm Optimization Based on Culture Algorithms.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 46, doi. 10.3390/a10020046
- By:
- Publication type:
- Article
Fuzzy Random Walkers with Second Order Bounds: An Asymmetric Analysis.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 40, doi. 10.3390/a10020040
- By:
- Publication type:
- Article
Revised Gravitational Search Algorithms Based on Evolutionary-Fuzzy Systems.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 44, doi. 10.3390/a10020044
- By:
- Publication type:
- Article
Reliable Portfolio Selection Problem in Fuzzy Environment: An mλ Measure Based Approach.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 43, doi. 10.3390/a10020043
- By:
- Publication type:
- Article
RGloVe: An Improved Approach of Global Vectors for Distributional Entity Relation Representation.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 42, doi. 10.3390/a10020042
- By:
- Publication type:
- Article
RST Resilient Watermarking Scheme Based on DWT-SVD and Scale-Invariant Feature Transform.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 41, doi. 10.3390/a10020041
- By:
- Publication type:
- Article
An Efficient Sixth-Order Newton-Type Method for Solving Nonlinear Systems.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 45, doi. 10.3390/a10020045
- By:
- Publication type:
- Article
From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 39, doi. 10.3390/a10020039
- By:
- Publication type:
- Article
An Asynchronous Message-Passing Distributed Algorithm for the Generalized Local Critical Section Problem.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 38, doi. 10.3390/a10020038
- By:
- Publication type:
- Article
A Spatial-Temporal-Semantic Neural Network Algorithm for Location Prediction on Moving Objects.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 37, doi. 10.3390/a10020037
- By:
- Publication type:
- Article
DNA Paired Fragment Assembly Using Graph Theory.
- Published in:
- Algorithms, 2017, v. 10, n. 2, p. 36, doi. 10.3390/a10020036
- By:
- Publication type:
- Article