Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
melt processing » text processing (Expand Search), image processing (Expand Search)
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
melt processing » text processing (Expand Search), image processing (Expand Search)
-
81
Chlorophyll-a concentrations in the Arabian Gulf waters of arid region: A case study from the northern coast of Qatar
Published 2022“…The performance of the algorithms was studied using WorldView-3 data, which provided the R2 values of 60% and the best suitability of the NDCI algorithm and MSI data to map the concentration of Chl-a. …”
Get full text
Get full text
Get full text
article -
82
Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study
Published 2021“…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …”
Get full text
article -
83
Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm
Published 2022“…The antecedent part parameters (Gaussian membership function parameters) are encoded as a population of artificial swarm of grasshoppers and optimized using its algorithm. Tuning of the consequent part parameters are accomplished using extreme learning machine. …”
-
84
-
85
Practical single node failure recovery using fractional repetition codes in data centers
Published 2016“…Hence, a practical solution for node failures is presented by using a self-designed genetic algorithm that searches within the feasible solution space. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
86
-
87
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
Published 2023“…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …”
-
88
-
89
-
90
-
91
The automation of the development of classification models and improvement of model quality using feature engineering techniques
Published 2023“…We demonstrated the applicability of feature engineering techniques such as data imputation, transformation (e.g., scaling, centering, etc.), and data balancing using several case studies and the proposed semi-automated framework. …”
-
92
A parallel search tree algorithm for vertex cover on graphical processing units. (c2013)
Published 2013Get full text
Get full text
masterThesis -
93
-
94
Detecting sleep outside the clinic using wearable heart rate devices
Published 2022“…Personalized yet device-agnostic algorithms can sidestep laborious human annotations and objectify cross-cohort comparisons. …”
-
95
Scalable Nonparametric Supervised Learning for Streaming and Massive Data: Applications in Healthcare Monitoring and Credit Risk
Published 2025“…Additionally, an online classifier is developed for streaming data, combining online PCA with a kernel-based recursive classifier using a stochastic approximation algorithm. …”
-
96
Design of adaptive arrays based on element position perturbations
Published 1993“…The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …”
Get full text
Get full text
article -
97
-
98
-
99
-
100
Portfolio Selection Problem Using CVaR Risk Measures Equipped with DEA, PSO, and ICA Algorithms
Published 2022“…There are different metrics for the calculation of the risk factor, among which the most important one is the Conditional Value at Risk (CVaR). On the other hand, Data Envelopment Analysis (DEA) can be used to form the optimal portfolio and evaluate its efficiency. …”