Search alternatives:
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
element » elements (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
element » elements (Expand Search)
-
221
New enumeration algorithm for regular boolean functions
Published 2018“…This algorithm exploits the equivalence between regular Boolean functions and positive threshold functions that can be used to represent instances of the knapsack problem. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
222
-
223
Parallel algorithm for hardware implementation of inverse halftoning
Published 2005“…A parallel algorithm and its hardware implementation are proposed for an inverse halftone operation. …”
Get full text
Get full text
article -
224
Parallel Algorithm for Hardware Implementation of Inverse Halftoning
Published 2005“…A Parallel algorithm and its hardware implementation of Inverse Halftone operation is proposed in this paper. …”
Get full text
article -
225
Incremental & classical genetic algorithm. (c2001)
Published 2001Get full text
Get full text
masterThesis -
226
Empirical comparison of regression test selection algorithms
Published 2001“…For example the Simulated Annealing algorithm can be used for emergency non-safety-critical maintenance situations with a large number of small modifications.…”
Get full text
Get full text
Get full text
article -
227
The Effects of Data Mining on Small Businesses in Dubai
Published 2011“…While there are numerous studies on the best data mining models and their uses, even on certain industries, this study focuses on the applications more than the algorithms and models and their usefulness for small businesses specifically. …”
Get full text
-
228
Spider monkey optimizations: application review and results
Published 2024“…Optimization algorithms are applied to find efficient solutions in different problems in several fields such as the routing in wireless networks, cloud computing, big data, image processing and scheduling, and so forth. …”
Get full text
-
229
A Hybrid Fault Detection and Diagnosis of Grid-Tied PV Systems: Enhanced Random Forest Classifier Using Data Reduction and Interval-Valued Representation
Published 2021“…The proposed approach deals with system uncertainties (current/voltage variability, noise, measurement errors, ⋯) by using an interval-valued data representation, and with large-scale systems by using a dataset size-reduction framework. …”
-
230
An Effective Hybrid NARX-LSTM Model for Point and Interval PV Power Forecasting
Published 2021“…First, the NARXNN model acquires the data to generate a residual error vector. Then, the stacked LSTM model, optimized by Tabu search algorithm, uses the residual error correction associated with the original data to produce a point and interval PVPF. …”
-
231
Optimization of Commercially Off the Shelf (COTS) Electric Propulsion System for Low Speed Fuel Cell UAV
Published 2013Get full text
doctoralThesis -
232
Application of Data Mining to Predict and Diagnose Diabetic Retinopathy
Published 2024Get full text
doctoralThesis -
233
Real-Time Performance Evaluation of a Genetic Algorithm Based Fuzzy Logic Controller for IPM Motor Drives
Published 2005“…The parameters for the GFLC are tuned by genetic algorithm (GA). The complete drive incorporating the GFLC is successfully implemented in real-time using a digital signal processor board DS 1102 for a laboratory 1-hp interior permanent magnet motor. …”
Get full text
article -
234
A localized navigation algorithm for radiation evasion for nuclear facilities: Optimizing the "Radiation Evasion" criterion: Part I
Published 2013“…In this paper, we introduce a navigation algorithm having general utility for occupational workers at nuclear facilities and places where radiation poses serious health hazards. …”
Get full text
article -
235
Intelligent Bilateral Client Selection in Federated Learning Using Game Theory
Published 2022“…To overcome this problem, we present in this paper FedMint, an intelligent client selection approach for federated learning on IoT devices using game theory and bootstrapping mechanism. Our solution involves designing (1) preference functions for the client IoT devices and federated servers to allow them to rank each other according to several factors such as accuracy and price, (2) intelligent matching algorithms that take into account the preferences of both parties in their design, and (3) bootstrapping technique that capitalizes on the collaboration of multiple federated servers in order to assign initial accuracy value for the new connected IoT devices. …”
Get full text
Get full text
Get full text
masterThesis -
236
-
237
Convergence behavior of the normalized least mean fourth algorithm
Published 2000“…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …”
Get full text
Get full text
article -
238
Optimizing Document Classification: Unleashing the Power of Genetic Algorithms
Published 2023“…Additionally, our proposed model optimizes the features using a genetic algorithm. Optimal feature selection performances a crucial role in this domain, enhancing the overall accuracy of the document classification system while reducing the time complexity associated with selecting the most relevant features from this large-dimensional space. …”
-
239
Evolutionary algorithm for predicting all-atom protein structure
Published 2011“…We present an improved version of a scatter search (SS) algorithm for predicting all-atoms protein structures using a recent energy model. …”
Get full text
Get full text
Get full text
conferenceObject -
240
GenDE: A CRF-Based Data Extractor
Published 2020“…If the wrapper failed to work with the new page, a new wrapper/schema would be re-generated by calling an unsupervised wrapper induction system. In this paper, a new data extractor called GenDE is proposed. It verifies the site schema and extracts data from the Web pages using Conditional Random Fields (CRFs). …”
Get full text
Get full text