Search alternatives:
system algorithm » swarm algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
finding » findings (Expand Search)
system algorithm » swarm algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
finding » findings (Expand Search)
-
1
Estimating Construction Project Duration Using a Machine Learning Algorithm
Published 2024Get full text
Get full text
Get full text
masterThesis -
2
Improved Reptile Search Algorithm by Salp Swarm Algorithm for Medical Image Segmentation
Published 2023“…This study proposes a novel nature-inspired meta-heuristic optimizer based on the Reptile Search Algorithm combed with Salp Swarm Algorithm for image segmentation using gray-scale multi-level thresholding, called RSA-SSA. …”
Get full text
-
3
A multi-class discriminative motif finding algorithm for autosomal genomic data. (c2015)
Published 2016“…These discriminative motifs can be further studied to understand their role both at the evolutionary and disease levels.…”
Get full text
Get full text
masterThesis -
4
Variable Selection in Data Analysis: A Synthetic Data Toolkit
Published 2024“…Variable (feature) selection plays an important role in data analysis and mathematical modeling. This paper aims to address the significant lack of formal evaluation benchmarks for feature selection algorithms (FSAs). …”
Get full text
article -
5
Adapted arithmetic optimization algorithm for multi-level thresholding image segmentation: a case study of chest x-ray images
Published 2023“…These techniques work well for bi-level thresholding, but when used to find the appropriate thresholds for multi-level thresholding, there will be issues with long calculation times, high computational costs, and the need for accuracy improvements. …”
Get full text
-
6
-
7
Meta-Heuristic Procedures for the Multi-Resource Leveling Problem with Activity Splitting
Published 2011Get full text
doctoralThesis -
8
UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data
Published 2024“…UniBFS exploits the inherent characteristic of binary algorithms-binary coding-to search the entire problem space for identifying relevant features while avoiding irrelevant ones. …”
-
9
Experimental Investigation and Comparative Evaluation of Standard Level Shifted Multi-Carrier Modulation Schemes With a Constraint GA Based SHE Techniques for a Seven-Level PUC Inv...
Published 2019“…Topology offers a reduced switch count solution with simple control strategy compared to the existing seven-level inverters. Different standard multicarrier sinusoidal pulse-width modulation techniques (SPWMs) are adapted for the generation of switching gate signals for the PUC power switches, and these SPWMs are compared with novel optimization-based selective harmonic elimination (SHE) that employs genetic algorithm (GA) for solving nonlinear SHE equation with a constraint that eliminated all third-order harmonics efficiently. …”
-
10
Auto-indexing Arabic texts based on association rule data mining. (c2015)
Published 2015“…Our model denotes extracting new relevant words by relating those chosen by the previous classical methods, to new words using data mining rules. …”
Get full text
Get full text
masterThesis -
11
-
12
The Role of KM in Enhancing AI Algorithms and Systems
Published 2020“…The current study shows the relation between KM processes and AI systems from a higher perspective, giving different options to apply other KM processes for the same AI algorithm to reduce any implementation challenges and enhance the adoption level. …”
Get full text
Get full text
-
13
Optimizing Document Classification: Unleashing the Power of Genetic Algorithms
Published 2023“…Additionally, our proposed model optimizes the features using a genetic algorithm. Optimal feature selection performances a crucial role in this domain, enhancing the overall accuracy of the document classification system while reducing the time complexity associated with selecting the most relevant features from this large-dimensional space. …”
-
14
Mining airline data for CRM strategies. (c2006)
Published 2006Get full text
Get full text
masterThesis -
15
Indexing Arabic texts using association rule data mining
Published 2019“…The model denotes extracting new relevant words by relating those chosen by previous classical methods to new words using data mining rules. …”
Get full text
Get full text
Get full text
Get full text
article -
16
Concurrent BIST Synthesis and Test Scheduling Using Genetic Algorithms
Published 2007“…The method is based on a genetic algorithm that efficiently explores the testable design space and finds a sub-optimal test registers assignment for each k-test session. …”
Get full text
Get full text
Get full text
article -
17
Predicting insulin dosage for diabetic patients to reach optimal glucose levels. (c2012)
Published 2012Get full text
Get full text
masterThesis -
18
Genetic Algorithm for Solving Site Layout Problem with Unequal-Size and Constrained Facilities
Published 2002“…The paper concludes with examples illustrating the strength and limitations of the proposed algorithm in the cases of ~1! loosely versus tightly constrained layouts with equal levels of interaction between facilities; ~2! …”
Get full text
Get full text
Get full text
article -
19
Artificial intelligence-based methods for fusion of electronic health records and imaging data
Published 2022“…In our analysis, a typical workflow was observed: feeding raw data, fusing different data modalities by applying conventional machine learning (ML) or deep learning (DL) algorithms, and finally, evaluating the multimodal fusion through clinical outcome predictions. …”
-
20
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…A MATLAB simulation used to evaluate the new strategy, and the metrics obtained from that simulation are compared to those obtained from the older methods. According to the findings of several studies, the framework is significantly more effective than conventional methods in maintaining high levels of privacy. …”
Get full text
Get full text