Search alternatives:
processing algorithm » processing algorithms (Expand Search)
light processing » signal processing (Expand Search), text processing (Expand Search), melt processing (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
element » elements (Expand Search)
processing algorithm » processing algorithms (Expand Search)
light processing » signal processing (Expand Search), text processing (Expand Search), melt processing (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
element » elements (Expand Search)
-
1
-
2
-
3
A Parallel Neural Networks Algorithm for the Clique Partitioning Problem
Published 2002“…The proposed algorithm has a time complexity of O(1) for a neural network with n vertices and c cliques. …”
Get full text
Get full text
article -
4
A FUZZY EVOLUTIONARY ALGORITHM FOR TOPOLOGY DESIGN OF CAMPUS NETWORKS
Published 2020“…In this paper, we present a Simulated Evolution algorithm for the design of campus network topology. …”
Get full text
article -
5
Topology design of switched enterprise networks using a fuzzy simulated evolution algorithm
Published 2020“…The problem consists of deciding the number, types, and locations of the network active elements (hubs, switches, and routers), as well as the links and their capacities. …”
Get full text
article -
6
Topology design of switched enterprise networks using a fuzzy simulated evolution algorithm
Published 2020“…The problem consists of deciding the number, types, and locations of the network active elements (hubs, switches, and routers), as well as the links and their capacities. …”
Get full text
article -
7
-
8
Multi-Objective Optimisation of Injection Moulding Process for Dashboard Using Genetic Algorithm and Type-2 Fuzzy Neural Network
Published 2024“…Computational techniques, like the finite element method, are used to analyse behaviours based on varied input parameters. …”
-
9
Predicting Compression Modes and Split Decisions for HEVC Video Coding Using Machine Learning Techniques
Published 2017Get full text
doctoralThesis -
10
-
11
Large language models for code completion: A systematic literature review
Published 2024“…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …”
-
12
Enhancing Breast Cancer Diagnosis With Bidirectional Recurrent Neural Networks: A Novel Approach for Histopathological Image Multi-Classification
Published 2025“…In this study, we introduce an innovative method for the multi-classification of breast cancer histopathological images utilizing Bidirectional Recurrent Neural Networks (BRNN). The BRNN structure consists of four unique elements: the backbone branch for transfer learning, the Gated Recurrent Unit (GRU), the residual collaborative branch, and the feature fusion module. …”
-
13
-
14
Nonlinear analysis of shell structures using image processing and machine learning
Published 2023“…We show that the results of the trained network agree well with the results of the nonlinear finite element analysis. …”
-
15
Intelligent Rapidly-Exploring Random Tree Star Algorithm
Published 2024Get full text
doctoralThesis -
16
Fuzzy simulated evolution algorithm for topology design of campusnetworks
Published 2000“…We present an approach based on the simulated evolution algorithm for the design of campus network topology. …”
Get full text
Get full text
article -
17
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006“…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …”
Get full text
Get full text
article -
18
A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques
Published 2022“…None of the surveys have ever comprehensively studied the use of Natural Language Processing (NLP) techniques for detection of phishing except one that shed light on the use of NLP techniques for classification and training purposes, while exploring a few alternatives. …”
Get full text
Get full text
-
19
Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection
Published 2011“…In order to analyze the performance of machine learning algorithms, data was provided by a bank to be used for educational purposes and shall remain undisclosed. …”
Get full text
-
20
Optimized FPGA Implementation of PWAM-Based Control of Three—Phase Nine—Level Quasi Impedance Source Inverter
Published 2019“…Since, PWAM control algorithm is more complex than PSCPWM, FPGA based implementation for PWAM control is discussed. …”