Search alternatives:
mining algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
-
341
Corona power loss computation in bundled bipolar conductors
Published 2000“…In this paper, a finite element (FE) based algorithm devoted for the computation of the corona current and hence the corona power loss associated with bundled bipolar high voltage direct current (HVDC) conductors is presented. …”
Get full text
Get full text
article -
342
An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation
Published 2001“…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …”
Get full text
article -
343
An evolutionary meta-heuristic for state justification insequential automatic test pattern generation
Published 2001“…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …”
Get full text
Get full text
article -
344
Approximate XML structure validation technical report
Published 2014“…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…”
Get full text
Get full text
Get full text
article -
345
The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions
Published 2022“…Then, we provide a comprehensive review of the most widely used DRL algorithms to address RRAM problems, including the value- and policy-based algorithms. …”
-
346
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security
Published 2024“…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …”
-
347
Video features with impact on user quality of experience
Published 2021“…We conduct experimental measurements and record videos with different frame rate, video resolution, transmission data rate, packet loss, delay and codec types. After collecting the QoE assessments, the supervised training data set is developed and imported into Rapid-Miner data mining tool. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
348
Growing hierarchical self-organizing map for filtering intrusion detection alarms
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
349
DASSI: differential architecture search for splice identification from DNA sequences
Published 2022“…<h2>Background</h2> <p>The data explosion caused by unprecedented advancements in the field of genomics is constantly challenging the conventional methods used in the interpretation of the human genome. …”
-
350
LDSVM: Leukemia Cancer Classification Using Machine Learning
Published 2022“…This study proposes a novel method using machine learning algorithms based on microarrays of leukemia GSE9476 cells. …”
-
351
A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem
Published 2008“…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …”
Get full text
Get full text
Get full text
article -
352
Computation of conformal invariants
Published 2020“…The method we use is based on the boundary integral equation method developed and implemented in [1]. …”
Get full text
Get full text
Get full text
article -
353
Shuffled Linear Regression with Erroneous Observations
Published 2019“…We propose an optimal recursive algorithm that updates the estimate from the underdetermined function that is based on that permutation-invariant constraint. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
354
A linear programming approach for the weighted graph matchingproblem
Published 1993“…The linear program is solved using a simplex-based algorithm. Then, approximate 0-1 integer solutions are obtained by applying the Hungarian method on the real solutions of the linear program. …”
Get full text
Get full text
article -
355
LOCATING DAMAGES IN THIN ALUMINIUM PLATES USING LAMB WAVES AND AGENETIC OPTIMIZATION APPROACH
Published 2021“…A new damage localization method based on Lamb waves is presented here for thin aluminium (Al) plate specimens using a Genetic optimization (GO) approach. …”
Get full text
-
356
A Biologicaly Inspired Decision Model for Multivariable Genetic- Fuzzy-AHP System
Published 2016“…One example would be the determination of CRM performance measurement given a variety of inputs related to marketing, data mining tools, ordered materials and communication.…”
Get full text
Get full text
Get full text
Get full text
article -
357
Turbo-charging dominating set with an FPT subroutine
Published 2017“…Turbo-charging is a recent algorithmic technique that is based on the fixed-parameter tractability of the dynamic versions of some problems as a way to improve heuristics. …”
Get full text
Get full text
Get full text
conferenceObject -
358
Power system output feedback stabilizer design via geneticalgorithms
Published 1997“…A digital simulation of the power system is then used in conjunction with the genetic algorithm to determine the output feedback gains. In the second method, the problem of selecting the output feedback gains is converted to a simple optimization problem with an eigenvalue based objective function, which is solved by a genetic algorithm. …”
Get full text
Get full text
article -
359
Computation of conformal invariants
Published 2021“…The method we use is based on the boundary integral equation method developed and implemented in [1]. …”
-
360
An explicit finite-difference scheme for wave propagation in nonlinear optical structures
Published 2001“…The algorithm is an explicit nonlinear finite-difference method (NFDM) based on the exact solution of the nonlinear discrete equations. …”
article