-
341
Evolutionary algorithms for VLSI multi-objective netlist partitioning
Published 2006“…A series of experiments are performed to evaluate the efficiency of the algorithms. ISCAS-85/89 benchmark circuits are used and experimental results are reported and analyzed to compare the performance of GA, TS and SimE. …”
Get full text
article -
342
A high-performance toolkit for fast exact algorithms
Published 2017Get full text
Get full text
Get full text
conferenceObject -
343
A hybrid graph representation for exact graph algorithms
Published 2014Get full text
Get full text
Get full text
conferenceObject -
344
-
345
Convergence behavior of the normalized least mean fourth algorithm
Published 2000“…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …”
Get full text
Get full text
article -
346
Evolutionary algorithm for predicting all-atom protein structure
Published 2011“…We present an improved version of a scatter search (SS) algorithm for predicting all-atoms protein structures using a recent energy model. …”
Get full text
Get full text
Get full text
conferenceObject -
347
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
Get full text
-
348
A GRASP Approach for Solving Large-Scale Electric Bus Scheduling Problems
Published 2021“…The problem is modelled using a mixed integer program (MIP) in which the charging time of an EB is pertinent to the battery’s state-of-charge level. …”
-
349
Mining airline data for CRM strategies. (c2006)
Published 2006Get full text
Get full text
masterThesis -
350
Spectrum Sensing Algorithms for Cooperative Cognitive Radio Networks
Published 2010Get full text
doctoralThesis -
351
A FAMILY OF NORMALIZED LEAST MEAN FOURTH ALGORITHMS
Published 2020“…In this work, a family of normalized least mean fourth algorithms is presented. Unlike the LMF algorithm, the convergence behavior of these algorithms is independent of the input data correlation statistics. …”
Get full text
article -
352
Swarm intelligence-based hyper-heuristic for the vehicle routing problem with prioritized customers
Published 2020“…Various studies have been conducted regarding this topic; nevertheless, up to now, few studies used the Cuckoo Search-based hyper-heuristic. This paper modifies a classical mathematical model that represents the VRPC, implements and tests an evolutionary Cuckoo Search-based hyper-heuristic, and then compares the results with those of our proposed modified version of the Clarke Wright (CW) algorithm. …”
Get full text
Get full text
Get full text
Get full text
article -
353
Metaheuristic Optimization Algorithms for Training Artificial Neural Networks
Published 2012“…The Cuckoo Search (CS) algorithm is a recently developed meta-heuristic optimization algorithm which is suitable for solving optimization problems. …”
Get full text
Get full text
article -
354
-
355
Application of Data Mining to Predict and Diagnose Diabetic Retinopathy
Published 2024Get full text
doctoralThesis -
356
Global smart cities classification using a machine learning approach to evaluating livability, technology, and sustainability performance across key urban indices
Published 2025“…Drawing on data from the Smart Cities Index (SCI) and other economic and sustainability competitiveness metrics, the study uses various <u>ML algorithms</u> to categorize cities into <u>performance classes</u>, ranging from high-achieving Class 1 to emerging Class 3 cities. …”
-
357
IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture
Published 2025“…The IoMT manufacturers need to offer their products at a competitive price, which forces them to use simplified architecture, leaving limited and, to some extent, no scope to employ sophisticated cybersecurity algorithms. …”
-
358
Data redundancy management for leaf-edges in connected environments
Published 2022“…Although the sensed data could be useful for various applications (e.g., event detection in cities, energy management in commercial buildings), it first requires pre-processing to clean various inconsistencies (e.g., anomalies, redundancies, missing values). …”
Get full text
Get full text
Get full text
Get full text
article -
359
An Auction-Based Scheduling Approach for Minimizing Latency in Fog Computing Using 5G Infrastructure
Published 2020Get full text
doctoralThesis -
360
Second-order conic programming for data envelopment analysis models
Published 2022“…Data envelopment analysis (DEA) is a widely used benchmarking technique. …”
Get full text
Get full text