Search alternatives:
learning algorithm » learning algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data learning » deep learning (Expand Search)
system » systems (Expand Search)
element » elements (Expand Search)
learning algorithm » learning algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data learning » deep learning (Expand Search)
system » systems (Expand Search)
element » elements (Expand Search)
-
341
-
342
-
343
New Efficient Frequency Domain Algorithm For H-Infinity Approximation
Published 2020“…The new algorithm is used to obtain reduced order controllers for a well known control problem.…”
Get full text
article -
344
Application of particle swarm optimization algorithm to multiuser detection in CDMA
Published 2005“…Multiple access interference and near-far effect cause performance limitation in the conventional single-user detector used in direct sequence/code division multiple access (DS-CDMA)-systems. …”
Get full text
Get full text
article -
345
Combining and adapting software quality predictive models by genetic algorithms
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
346
Efficient Dynamic Cost Scheduling Algorithm for Data Batch Processing
Published 2016Get full text
doctoralThesis -
347
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006“…The algorithm is tested using 200 randomly generated 2-variable 4-valued functions. …”
Get full text
Get full text
article -
348
-
349
-
350
-
351
Tailoring motivational health messages for smoking cessation using an mHealth recommender system integrated with an electronic health record: a study protocol
Published 2018“…</p><h3>Discussion</h3><p dir="ltr">This study will explore whether a health recommender system algorithm integrated with an electronic health record can predict which tailored motivational health messages patients would prefer and consider to be of a good quality, encouraging them to engage with the system. …”
-
352
General applicability of genetic and simulated annealing algorithms for data mapping
Published 1995Get full text
Get full text
Get full text
conferenceObject -
353
Properties of simulated annealing and genetic algorithms for mapping data to multicomputers
Published 1997“…These properties of flexibility and general applicability, which are lacking in other heuristic algorithms, make the GA and SA attractive for automatic parallelization systems.…”
Get full text
Get full text
Get full text
article -
354
-
355
-
356
-
357
A novel hybrid methodology for fault diagnosis of wind energy conversion systems
Published 2023“…Therefore, a hybrid feature selection based diagnosis technique, that can preserve the advantages of wrapper and filter algorithms as well as RF model, is proposed. In the first phase, the neighborhood component analysis (NCA) filter algorithm is used to reduce and select only the pertinent features from the original raw data. …”
-
358
Fault Diagnosis Based Machine Learning and Fault Tolerant Control of Multicellular Converter Used in Photovoltaic Water Pumping System
Published 2023“…In this study, a photovoltaic water pumping system with two power converters, the first is used to extract the maximum power using the maximum power point tracking (MPPT) algorithm, and the second is a three-cell multicellular power converter used to control the DC motor with a submerged pump. …”
-
359
Multi Self-Organizing Map (SOM) Pipeline Architecture for Multi-View Clustering
Published 2024“…Finally, this study proposed a novel multi-view learning framework that analyzes multi-source data and generates fine clusters efficiently.…”
-
360
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
Published 2024“…This SDN-ML-IoT uses a Machine Learning (ML) method in a Software-Defined Networking (SDN) environment in order to protect smart home IoT devices from DDoS attacks. …”