بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
agent » agents (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
agent » agents (توسيع البحث)
-
261
Convergence behavior of the normalized least mean fourth algorithm
منشور في 2000"…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …"
احصل على النص الكامل
احصل على النص الكامل
article -
262
Optimizing Document Classification: Unleashing the Power of Genetic Algorithms
منشور في 2023"…Additionally, our proposed model optimizes the features using a genetic algorithm. Optimal feature selection performances a crucial role in this domain, enhancing the overall accuracy of the document classification system while reducing the time complexity associated with selecting the most relevant features from this large-dimensional space. …"
-
263
Multi-Modal Emotion Aware System Based on Fusion of Speech and Brain Information
منشور في 2019"…In all likelihood, while features from several modalities may enhance the classification performance, they might exhibit high dimensionality and make the learning process complex for the most used machine learning algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
-
264
Evolutionary algorithm for predicting all-atom protein structure
منشور في 2011"…We present an improved version of a scatter search (SS) algorithm for predicting all-atoms protein structures using a recent energy model. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
265
GenDE: A CRF-Based Data Extractor
منشور في 2020"…If the wrapper failed to work with the new page, a new wrapper/schema would be re-generated by calling an unsupervised wrapper induction system. In this paper, a new data extractor called GenDE is proposed. It verifies the site schema and extracts data from the Web pages using Conditional Random Fields (CRFs). …"
احصل على النص الكامل
احصل على النص الكامل
-
266
Three-phase simulated annealing algorithms for exam scheduling
منشور في 2003"…We empirically compare 3PSA with a 4-phase clustering-based heuristic algorithm using realistic data. Our experimental results show that 3PSA produces good exam schedules, which are better than those of the clustering heuristic procedure.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
267
A FAMILY OF NORMALIZED LEAST MEAN FOURTH ALGORITHMS
منشور في 2020"…In this work, a family of normalized least mean fourth algorithms is presented. Unlike the LMF algorithm, the convergence behavior of these algorithms is independent of the input data correlation statistics. …"
احصل على النص الكامل
article -
268
-
269
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
منشور في 2022"…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
احصل على النص الكامل
-
270
Application of Data Mining to Predict and Diagnose Diabetic Retinopathy
منشور في 2024احصل على النص الكامل
doctoralThesis -
271
Global smart cities classification using a machine learning approach to evaluating livability, technology, and sustainability performance across key urban indices
منشور في 2025"…Drawing on data from the Smart Cities Index (SCI) and other economic and sustainability competitiveness metrics, the study uses various <u>ML algorithms</u> to categorize cities into <u>performance classes</u>, ranging from high-achieving Class 1 to emerging Class 3 cities. …"
-
272
IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture
منشور في 2025"…The IoMT manufacturers need to offer their products at a competitive price, which forces them to use simplified architecture, leaving limited and, to some extent, no scope to employ sophisticated cybersecurity algorithms. …"
-
273
A comparison of optimization heuristics for the data mapping problem
منشور في 1997"…In this paper we compare the performance of six heuristics with suboptimal solutions for the data mapping problem of two dimensional meshes that are used for the numerical solution of Partial Differential Equations(PDEs) on multicomputers. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
274
Big Data Energy Management, Analytics and Visualization for Residential Areas
منشور في 2020"…A high-speed distributed computing cluster based on commodity hardware with efficient big data mathematical algorithm is employed in this work. …"
احصل على النص الكامل
article -
275
Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures
منشور في 2025"…To determine the parameters of the regime switching model and identify when economic states change, we employ the EM algorithm, utilizing real gas futures price data. We validate our closed-form solution for the option pricing through simulations employing the generalized antithetic variates Monte-Carlo technique. …"
احصل على النص الكامل
article -
276
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
منشور في 2006"…The algorithm is tested using 200 randomly generated 2-variable 4-valued functions. …"
احصل على النص الكامل
احصل على النص الكامل
article -
277
Simulated annealing and genetic algorithms for exam scheduling. (c1997)
منشور في 1997احصل على النص الكامل
احصل على النص الكامل
masterThesis -
278
Artificial Intelligence Driven Smart Farming for Accurate Detection of Potato Diseases: A Systematic Review
منشور في 2024"…It further aids in addressing challenges like data availability and geographical variations. It has been learned that image-processing techniques overwhelm the existing research and have the potential to integrate meteorological data. …"
-
279
Bee colony algorithm for assigning proctors to exams. (c2013)
منشور في 2013احصل على النص الكامل
احصل على النص الكامل
masterThesis -
280
Second-order conic programming for data envelopment analysis models
منشور في 2022"…Data envelopment analysis (DEA) is a widely used benchmarking technique. …"
احصل على النص الكامل
احصل على النص الكامل