Showing 41 - 60 results of 156 for search '(((( complement c3 algorithm ) OR ( experiments 1 algorithm ))) OR ( level coding algorithm ))', query time: 0.19s Refine Results
  1. 41

    A Hybrid Deep Learning Model Using CNN and K-Mean Clustering for Energy Efficient Modelling in Mobile EdgeIoT by Dhananjay Bisen (19482454)

    Published 2023
    “…This research proposed a hybrid model for energy-efficient cluster formation and a head selection (E-CFSA) algorithm based on convolutional neural networks (CNNs) and a modified k-mean clustering (MKM) method for MEC. …”
  2. 42
  3. 43

    Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images by Rehan Raza (17019105)

    Published 2023
    “…Lung-EffNet is evaluated by utilizing five variants of EfficientNet i.e., B0–B4. The experiments are conducted on the benchmark dataset “IQ-OTH/NCCD” for lung cancer patients grouped as benign, malignant, or normal based on the presence or absence of lung cancer. …”
  4. 44

    Boosting the visibility of services in microservice architecture by Ahmet Vedat Tokmak (17773479)

    Published 2023
    “…Our research also analyzed the boosting algorithms, namely Gradient Boost, XGBoost, LightGBM, and CatBoost to improve the overall performance. …”
  5. 45

    Correlation Clustering via s-Club Cluster Edge Deletion by Makarem, Norma

    Published 2023
    “…We run these algorithms and cross-compare the three experiment results to the fastest Cluster Editing algorithm which runs in O(1.62k) time. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  6. 46

    Mixed precision iterative refinement with adaptive precision sparse approximate inverse preconditioning by Noaman Khan (19810050)

    Published 2025
    “…<p dir="ltr">Hardware trends have motivated the development of mixed precision algorithms in numerical linear algebra, which aim to decrease runtime while maintaining acceptable accuracy. …”
  7. 47

    A clustering metaheuristic for large orienteering problems by Almiqdad Elzein (13141038)

    Published 2022
    “…We have validated the effectiveness of the proposed metaheuristic design through a set of computational experiments. In particular, using a state-of-the-art heuristic and an exact algorithm, we have shown that it is significantly beneficial to use the Orienteering Problem algorithm plugged into our metaheuristic, as opposed to using it as a standalone algorithm. …”
  8. 48

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …”
    Get full text
  9. 49

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment by Zakaria Tolba (16904718)

    Published 2022
    “…On the other hand, the transfer learning skills demonstrated in this study indicate that discovering suitable testing models from the ground is also achievable using our model with optimum prior cryptographic expertise, where we contribute the results of deep learning in the field of deep learning based differential cryptanalysis development.Various experiments were performed on discrete and continuous chaotic and non-chaotic permutation patterns, and the best-performing model had an MSE of 1.8217e−04 and an R2 of 1, demonstrating the practicality of the suggested technique.…”
  10. 50

    Improving MRI Resolution: A Cycle Consistent Generative Adversarial Network-Based Approach for 3T to 7T Translation by Zakaria Shams Siam (22048001)

    Published 2024
    “…Efforts are underway to develop algorithms that can generate 7T MRI from 3T MRI to achieve better image quality without the need for 7T MRI machines. …”
  11. 51
  12. 52
  13. 53
  14. 54

    Inception voltage of corona in bipolar ionized fields-effect oncorona power loss by Al-Hamouz, Z.

    Published 1996
    “…Comparison with previously computed V-I characteristics showed that the present computed values were in better agreement with experiments. …”
    Get full text
    Get full text
    article
  15. 55
  16. 56
  17. 57

    Benchmark on a large cohort for sleep-wake classification with machine learning techniques by Joao Palotti (8479842)

    Published 2019
    “…The performance, in regards to accuracy and F1 score of the machine learning algorithms, was also superior to the device’s native algorithm and comparable to human annotation. …”
  18. 58

    LOCATING DAMAGES IN THIN ALUMINIUM PLATES USING LAMB WAVES AND AGENETIC OPTIMIZATION APPROACH by A. Masurkar, Faeez

    Published 2021
    “…The damage locations are further optimized within the enclosed area using the GO algorithm. The optimized results of damage well correspond with the actual ones and thus manifest the ability of the proposed approach for locating different types of defects in an Al specimen using a sparse array of permanently installed PW transducers.…”
    Get full text
  19. 59

    Recent Advances in Harris Hawks Optimization: A Comparative Study and Applications by Hussie, Abdelazim

    Published 2022
    “…Moreover, several experiments were carried out to prove the powerfulness and effectivness of HHO compared with nine other state-of-art algorithms using Congress on Evolutionary Computation (CEC2005) and CEC2017. …”
    Get full text
  20. 60

    A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study by Masurkar, Faeez

    Published 2022
    “…Fifth, it is also observed that the actuation and sensing position plays a crucial role in receiving the time-domain data with a sufficient SNR and the one that is easy to analyze and interpret. Based on the numerous experiments, an optimum distance of inspection is estimated which yields damage detection and localization with high accuracy thereby solving all the aforementioned issues. …”
    Get full text