Search alternatives:
based design » based decision (Expand Search)
Showing 1 - 8 results of 8 for search '(( primary based design optimization algorithm ) OR ( binary image based optimization algorithm ))', query time: 0.10s Refine Results
  1. 1

    Retinal imaging based glaucoma detection using modified pelican optimization based extreme learning machine by Debendra Muduli (20748758)

    Published 2024
    “…<p dir="ltr">Glaucoma is defined as progressive optic neuropathy that damages the structural appearance of the optic nerve head and is characterized by permanent blindness. For mass fundus image-based glaucoma classification, an improved automated computer-aided diagnosis (CAD) model performing binary classification (glaucoma or healthy), allowing ophthalmologists to detect glaucoma disease correctly in less computational time. …”
  2. 2
  3. 3
  4. 4

    A modified optimal design of a vibration absorber for ground motion isolation by Issa, Jimmy S.

    Published 2014
    “…The first is based on the genetic algorithm technique and the second on the downhill simplex method. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  5. 5
  6. 6

    Design of a vibration absorber for harmonically forced damped systems by Issa, Jimmy

    Published 2013
    “…The utmost optimal parameters associated with the optimal mass ratios are tabulated to be used for the design of such absorbers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 7

    Opportunistic Throughput Optimization in Energy Harvesting Dynamic Spectrum Sharing Wireless Networks by Amirhossein Taherpour (19273879)

    Published 2024
    “…Furthermore, we propose two algorithms designed to achieve optimal throughput for each scenario. …”
  8. 8

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”