Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
new algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
new algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
-
1
-
2
A new approach to record clustering for large databases. (c1997)
Published 1997Get full text
Get full text
masterThesis -
3
CNN and HEVC Video Coding Features for Static Video Summarization
Published 2022Get full text
article -
4
-
5
-
6
-
7
-
8
Automatic Video Summarization Using HEVC and CNN Features
Published 2022Get full text
doctoralThesis -
9
Kernelization algorithms for the vertex cover problem
Published 2017Get full text
Get full text
Get full text
conferenceObject -
10
-
11
Efficient heuristic algorithms for influence propagation in social networks. (c2018)
Published 2018“…Our experiments on a variety of social (sub) networks show that our algorithms can almost always manage to extract a small set of influencers through which we can effectively propagate a message throughout the whole network.…”
Get full text
Get full text
Get full text
masterThesis -
12
An image processing and genetic algorithm-based approach for the detection of melanoma in patients
Published 2018“…However, these methods are not always well founded because they depend heavily on the physician’s experience. Hence, there is a great need for a new automated approach in order to make diagnosis more reliable. …”
Get full text
Get full text
Get full text
Get full text
article -
13
A non-convex economic load dispatch problem using chameleon swarm algorithm with roulette wheel and Levy flight methods
Published 2023“…An Enhanced Chameleon Swarm Algorithm (ECSA) by integrating roulette wheel selection and Lévy flight methods is presented to solve non-convex Economic Load Dispatch (ELD) problems. …”
Get full text
-
14
Improved Jaya Synergistic Swarm Optimization Algorithm to Optimize Task Scheduling Problems in Cloud Computing
Published 2024“…The Jaya algorithm's ability to exploit the current best solutions is complemented by the SSO's collaborative search strategy, resulting in a synergistic optimization framework. …”
Get full text
-
15
Augmented arithmetic optimization algorithm using opposite-based learning and lévy flight distribution for global optimization and data clustering
Published 2022“…This paper proposes a new data clustering method using the advantages of metaheuristic (MH) optimization algorithms. …”
-
16
A dynamically turbo-charged heuristic for graph coloring. (c2018)
Published 2018“…The recently introduced turbo-charging idea is further enhanced in this thesis by introducing a dynamic version of turbo-charging where the moment of regret and the rollback points are determined dynamically. Experiments comparing our turbo-charging algorithm to other heuristics were conducted on a number of known benchmarks. …”
Get full text
Get full text
Get full text
masterThesis -
17
Efficient Approximate Conformance Checking Using Trie Data Structures
Published 2021“…In this paper, we contribute a new formulation of the proxy behavior derived from a model for approximate conformance checking. …”
Get full text
Get full text
Get full text
-
18
On-site workshop investment problem: A novel mathematical approach and solution procedure
Published 2023“…Next, due to the NP-hardness of the problem, an enhanced Genetic Algorithm (GA)-based metaheuristic with efficient problem-specific improvement rules as local search and effective crossover and mutation operators is proposed. …”
-
19
Boosting the visibility of services in microservice architecture
Published 2023“…Recent SOA implementations made use of cloud-native architectural approaches such as microservice architecture, which has resulted in a new challenge: the discovery difficulties of services. …”
-
20
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …”
Get full text