Development of sports industry under the influence of COVID-19 epidemic situation based on big data

Y Wang, D Zeng - Journal of Intelligent & Fuzzy Systems, 2020 - content.iospress.com
Based on big data, this paper studies the influence of new type of filling pneumonia on the
development of sports industry. When selecting the typical economic indicators that reflect …

Analyzing and Predicting Verification of Data-Aware Process Models–A Case Study With Spectrum Auctions

E Ordoni, J Bach, AK Fleck - IEEE Access, 2022 - ieeexplore.ieee.org
Verification techniques play an essential role in detecting undesirable behaviors in many
applications like spectrum auctions. By verifying an auction design, one can detect the least …

A classification model based on svm and fuzzy rough set for network intrusion detection

S Kejia, H Parvin, SN Qasem… - Journal of Intelligent & …, 2020 - content.iospress.com
Intrusion Detection Systems (IDS) are designed to provide security into computer networks.
Different classification models such as Support Vector Machine (SVM) has been …

Cluster ensemble selection using balanced normalized mutual information

Z Wang, H Parvin, SN Qasem… - Journal of Intelligent …, 2020 - content.iospress.com
A bad partition in an ensemble will be removed by a cluster ensemble selection framework
from the final ensemble. It is the main idea in cluster ensemble selection to remove these …

[PDF][PDF] Checking Reachability Property in Complex Concurrent Software Systems with a Knowledge Discovery Approach

J Partabian, K Bagherifard, V Rafe, H Parvin… - Journal of Soft …, 2023 - jscit.nit.ac.ir
The model checking technique is a formal and effectual way in verification of software
systems. By the generation and investigation of all model states, it analyses the software …

Using deep reinforcement learning to search reachability properties in systems specified through graph transformation

MJ Mehrabi, V Rafe - Soft Computing, 2022 - Springer
Today, model checking is one of the essential techniques in the verification of software
systems. This technique can verify some properties such as reachability in which the entire …

A step edge detector based on bilinear transformation

K Dabighi, A Nazari, S Saryazdi - Journal of Intelligent & …, 2021 - content.iospress.com
Nowadays, Canny edge detector is considered to be one of the best edge detection
approaches for the images with step form. Various overgeneralized versions of these edge …

Checking Reachability Property in Complex Concurrent Software Systems with a Knowledge Discovery Approach

V Rafe - 2022 - researchsquare.com
The model checking technique is a formal and effectual way in verification of software
systems. By generation and verification of all model states, it analyses the software systems …

وارسی ویژگی دسترس پذیری در سیستم های نرم افزاری پیچیده و همروند با رویکرد کشف دانش

پرتابیان, جعفر, باقری فرد, کرم الله, رافع… - مجله علمی رایانش نرم و …, 2023‎ - jscit.nit.ac.ir
تکنیک وارسی مدل، روشی رسمی و مؤثر جهت تأیید سیستم‌های نرم‌افزاری است که با تولید و
بررسی همه حالتهای ممکنِ مدلی از سیستم نرم‌افزار به تحلیل آن میپردازد. چالش اساسی وارسی مدل در …

[PDF][PDF] Reachability checking in complex and concurrent intelligent search methods using systems software

K Bagherifard - sid.ir
The model checking technique is a formal and effective method for verifying software
systems, which analyses it via generating and examining all possible states of a model of …