Search alternatives:
making algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
box algorithm » rd algorithm (Expand Search)
level using » level fusion (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
making algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
box algorithm » rd algorithm (Expand Search)
level using » level fusion (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
-
61
Properties of Unique Degree Sequences of 3-Uniform Hypergraphs
Published 2021“…The existence of this hypergraph makes us conjecture an extended generating algorithm for the sequences of Deza et al. to include a much wider class of unique 3-uniform hypergraphs. …”
Get full text
-
62
Sensitivity analysis and genetic algorithm-based shear capacity model for basalt FRC one-way slabs reinforced with BFRP bars
Published 2023“…However, FRP-reinforced concrete (RC) structures exhibit less ductile response compared to steel RC structures. Recently, the use of basalt fiber reinforced concrete (BFRC) reinforced with BFRP bars was investigated to achieve a reasonable level of ductility in BFRC-BFRP one-way slabs. …”
-
63
-
64
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
65
Development of an Optimization Scheme for A Fixed-Wing UAV Long Endurance with PEMFC and Battery
Published 2018Get full text
doctoralThesis -
66
-
67
A Framework for Predictive Modeling in Sustainable Projects
Published 2012Get full text
doctoralThesis -
68
Simultaneous stabilisation of power systems using geneticalgorithms
Published 1997“…The paper considers the simultaneous stabilisation of a power system over a wide range of operating conditions via a single power system stabiliser using genetic algorithms. A power system operating at various load levels is treated as a finite set of plants. …”
Get full text
Get full text
article -
69
A Survey of Data Clustering Techniques
Published 2023“…This survey examines seven widely recognized clustering techniques, namely k-means, G-means, DBSCAN, Agglomerative hierarchical clustering, Two-stage density (DBSCAN and k-means) algorithm, Two-levels (DBSCAN and hierarchical) clustering algorithm, and Two-stage MeanShift and K-means clustering algorithm and compares them over a real dataset - The Blockchain dataset, including prominent cryptocurrencies like Binance, Bitcoin, Doge, and Ethereum, under several metrics such as silhouette coefficient, Calinski-Harabasz, Davies-Bouldin Index, time complexity, and entropy.…”
Get full text
Get full text
Get full text
masterThesis -
70
Efficient Seismic Volume Compression using the Lifting Scheme
Published 2000“…A separable 3-D discrete wavelet transform (DWT) using long biorthogonal filters is used. The computation efficiency of the DWT is improved by factoring the wavelet filters using the lifting scheme. …”
Get full text
article -
71
Cyberbullying Detection in Arabic Text using Deep Learning
Published 2023“…Therefore, this study aims to evaluate several versions of Recurrent Neural Networks (RNNs) and Feedforward Neural Networks (FNNs) for detecting cyberbullying in the Arabic language. Although these algorithms are widely used in text classification and outperform the performance of classical classifiers, many have been extensively investigated in other domains such as sentiment analysis and dialect identification, as well as cyberbullying detection in English text. …”
Get full text
-
72
A method for data path synthesis using neural networks
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
73
-
74
Modulation With Metaheuristic Approach for Cascaded-MPUC49 Asymmetrical Inverter With Boosted Output
Published 2020“…For the calculation of optimum angles, a meta-heuristic based Genetic Algorithm (GA) technique is employed. The generation of 49-level output requires 24 transitions in one quarter of a cycle. …”
-
75
-
76
-
77
FPGA-Based Network Traffic Classification Using Machine Learning
Published 2020“…Classification approaches based on machine learning techniques have shown promising results with high levels of accuracy. In this paper, the suitability of packet-level and flow-level features is validated using stepwise regression and random forest feature selection. …”
Get full text
article -
78
An efficient approach for textual data classification using deep learning
Published 2022“…<p dir="ltr">Text categorization is an effective activity that can be accomplished using a variety of classification algorithms. In machine learning, the classifier is built by learning the features of categories from a set of preset training data. …”
-
79
FPGA-Based Network Traffic Classification Using Machine Learning
Published 2019Get full text
doctoralThesis -
80
A Graph Heuristic Approach for the Data Path Allocation Problem
Published 2022“…To optimize this allocation problem, a variation of the Fiduccia-Mattheyses (FM) algorithm is presented. The algorithm starts with a schedule as input and partitions it into available hardware resources using a modifi ed version of the Fiduccia-Mattheyses algorithm to t the datapath allocation problem. …”
Get full text
Get full text
Get full text
masterThesis