Ara
Toplam kayıt 142, listelenen: 131-140
Aramanızla eşleşen bölüm veya koleksiyonlar
Aramanızla eşleşen öğeler
When machine learning meets fractional-order chaotic signals: detecting dynamical variations
(Elsevier, 2022)
The challenge of classifying multivariate time series generated by discrete and continuous dynamical systems according to their chaotic or non-chaotic behavior has been studied extensively in the literature. The examination ...
A study about excellent xanthine oxidase inhibitory effects of new pyridine salts
(Springer, 2021)
A series of pyridine salts were synthesized containing vitamin B3 (niacin), isonicotinonitrile, and non-substituted pyridine fragment from reactions of 1,3-dibromopropane, 1,4-dibromobutane, and 4,4′-bis(chloromethyl)-1, ...
A Novel Analog Modulation Classification: Discrete Wavelet Transform-Extreme Learning Machine (DWT-ELM)
(Bitlis Eren Üniversitesi, 2021)
The aim of this study is to propose a method using discrete wavelet transform and extreme learning machine (DWT-ELM) in classification of communication signals. Six types of analog modulated signals as “AM”, “DSB”, “USB”, ...
A novel deep learning-based feature selection model for improving the static analysis of vulnerability detection
(Springer, 2021)
The automatic detection of software vulnerabilities is considered a complex and common research problem. It is possible to detect several security vulnerabilities using static analysis (SA) tools, but comparatively high ...
Invariant convergent and invariant ideal convergent sequence in intuitionistic fuzzy normed space
(IOS Press, 2022)
The main purpose of this paper is to introduce invariant convergence in intuitionistic fuzzy normed space. Following which we present some characteristics of this notion with respect to intuitionistic fuzzy norm. We also ...
The Role of Vulnerable Software Metrics on Software Maintainability Prediction
(Dergipark, 2021)
Software maintainability is among the basic quality features of software engineering. Vulnerability prediction is crucial to protect software maintainability from attacks for cybersecurity. Hence, managing vulnerability ...