Search alternatives:
model optimization » level optimization (Expand Search), motor optimization (Expand Search), monkey optimizations (Expand Search)
based design » based decision (Expand Search)
model optimization » level optimization (Expand Search), motor optimization (Expand Search), monkey optimizations (Expand Search)
based design » based decision (Expand Search)
-
1
-
2
Retinal imaging based glaucoma detection using modified pelican optimization based extreme learning machine
Published 2024“…<p dir="ltr">Glaucoma is defined as progressive optic neuropathy that damages the structural appearance of the optic nerve head and is characterized by permanent blindness. For mass fundus image-based glaucoma classification, an improved automated computer-aided diagnosis (CAD) model performing binary classification (glaucoma or healthy), allowing ophthalmologists to detect glaucoma disease correctly in less computational time. …”
-
3
A modified optimal design of a vibration absorber for ground motion isolation
Published 2014“…The first is based on the genetic algorithm technique and the second on the downhill simplex method. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
4
-
5
A Fusion-Based Approach for Skin Cancer Detection Combining Clinical Images, Dermoscopic Images, and Metadata
Published 2025Get full text
doctoralThesis -
6
Design of a vibration absorber for harmonically forced damped systems
Published 2013“…The utmost optimal parameters associated with the optimal mass ratios are tabulated to be used for the design of such absorbers. …”
Get full text
Get full text
Get full text
Get full text
article -
7
Opportunistic Throughput Optimization in Energy Harvesting Dynamic Spectrum Sharing Wireless Networks
Published 2024“…Furthermore, we propose two algorithms designed to achieve optimal throughput for each scenario. …”
-
8
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”