Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithms » cosine algorithm (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
processing algorithm » processing algorithms (Expand Search)
using algorithms » cosine algorithm (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
-
201
A comparison of optimization heuristics for the data mapping problem
Published 1997“…In this paper we compare the performance of six heuristics with suboptimal solutions for the data mapping problem of two dimensional meshes that are used for the numerical solution of Partial Differential Equations(PDEs) on multicomputers. …”
Get full text
Get full text
Get full text
article -
202
Social spider optimization algorithm: survey and new applications
Published 2024“…Finally, this chapter provides an expectation of the fields that need to work with this algorithm to improve problem-solving and the fields that have a growing number studies that use this algorithm.…”
Get full text
-
203
IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture
Published 2025“…The IoMT manufacturers need to offer their products at a competitive price, which forces them to use simplified architecture, leaving limited and, to some extent, no scope to employ sophisticated cybersecurity algorithms. …”
-
204
Data redundancy management for leaf-edges in connected environments
Published 2022“…Although the sensed data could be useful for various applications (e.g., event detection in cities, energy management in commercial buildings), it first requires pre-processing to clean various inconsistencies (e.g., anomalies, redundancies, missing values). …”
Get full text
Get full text
Get full text
Get full text
article -
205
Simulated annealing and genetic algorithms for exam scheduling. (c1997)
Published 1997Get full text
Get full text
masterThesis -
206
Application of Data Mining to Predict and Diagnose Diabetic Retinopathy
Published 2024Get full text
doctoralThesis -
207
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
Published 2019“…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …”
-
208
GenDE: A CRF-Based Data Extractor
Published 2020“…If the wrapper failed to work with the new page, a new wrapper/schema would be re-generated by calling an unsupervised wrapper induction system. In this paper, a new data extractor called GenDE is proposed. It verifies the site schema and extracts data from the Web pages using Conditional Random Fields (CRFs). …”
Get full text
Get full text
-
209
(k, l)-Clustering for Transactional Data Streams Anonymization
Published 2018Get full text
Get full text
Get full text
Get full text
conferenceObject -
210
A Parallel Algorithm for Inverse Halftoning and its Hardware Implementation
Published 2020“…Keywords: (1) Inverse Halftoning (2) Hardware Implementation (3) Look-Up Table Inverse Halftoning (4) Complex Programmable Logic Devices (CPLD) (5) Image Processing…”
Get full text
article -
211
Animal migration optimization algorithm: novel optimizer, analysis, and applications
Published 2024“…It is based on the animal actions and habits in migration seasons. Optimization algorithms are applied to find the optimal solutions in many domains and fields such as image processing, machine learning, and others. …”
Get full text
-
212
CNN feature and classifier fusion on novel transformed image dataset for dysgraphia diagnosis in children
Published 2023“…The pre-trained DenseNet201 network is used for CNN feature extraction from each task-specific handwritten image data. …”
Get full text
Get full text
Get full text
article -
213
A fast exact sequential algorithm for the partial digest problem
Published 2016“…Two types of simulated data, random and Zhang, are used to measure the efficiency of the algorithm. …”
-
214
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006“…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …”
Get full text
Get full text
article -
215
Data mining approach to predict student's selection of program majors
Published 2019“…The approach includes a methodology to manage data mining projects, sampling techniques to handle imbalanced data and multiclass data, a set of classification algorithms to predict and measures to evaluate performance of models. …”
Get full text
-
216
CNN feature and classifier fusion on novel transformed image dataset for dysgraphia diagnosis in children
Published 2023“…The pre-trained DenseNet201 network is used for CNN feature extraction from each task-specific handwritten image data. …”
-
217
Eye-Clustering: An Enhanced Centroids Prediction for K-means Algorithm
Published 2024“…Among these, K-means is widely used for efficiently solving clustering problems. …”
Get full text
Get full text
Get full text
masterThesis -
218
A Scatter search algorithm for exam scheduling. (c2006)
Published 2006Get full text
Get full text
masterThesis -
219
-
220
Enhanced climate change resilience on wheat anther morphology using optimized deep learning techniques
Published 2024“…The DinoLite Microscope’s high-resolution images are used to measure the length and width of wheat anthers. …”