Search alternatives:
developing based » developing a (Expand Search), developing 21st (Expand Search)
using algorithm » cosine algorithm (Expand Search)
per algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
elements per » elementi per (Expand Search), elements _ (Expand Search)
developing based » developing a (Expand Search), developing 21st (Expand Search)
using algorithm » cosine algorithm (Expand Search)
per algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
elements per » elementi per (Expand Search), elements _ (Expand Search)
-
241
A Tabu Search Algorithm For Maintenance Scheduling Of Generating Units
Published 2020“…A new heuristic algorithm based on the Tabu search has been proposed for the maintenance schedule (MS) of electric generation units. …”
Get full text
article -
242
A Tabu Search Algorithm For Maintenance Scheduling Of Generating Units
Published 2020“…A new heuristic algorithm based on the Tabu search has been proposed for the maintenance schedule (MS) of electric generation units. …”
Get full text
article -
243
Second-order conic programming for data envelopment analysis models
Published 2022“…Data envelopment analysis (DEA) is a widely used benchmarking technique. …”
Get full text
Get full text
-
244
Power Control Algorithms for Media Transmission in Remote Healthcare Systems
Published 2018“…Thus, this paper first proposes a transmission power control (TPC)-based energy-efficient algorithm (EEA) for when a subject is in different postures, i.e., standing, walking, and running, in wireless body sensor networks. …”
-
245
Data mining approach to predict student's selection of program majors
Published 2019“…The approach includes a methodology to manage data mining projects, sampling techniques to handle imbalanced data and multiclass data, a set of classification algorithms to predict and measures to evaluate performance of models. …”
Get full text
-
246
-
247
-
248
Enhanced climate change resilience on wheat anther morphology using optimized deep learning techniques
Published 2024“…The DinoLite Microscope’s high-resolution images are used to measure the length and width of wheat anthers. …”
-
249
Deep Learning-Based Fault Diagnosis of Photovoltaic Systems: A Comprehensive Review and Enhancement Prospects
Published 2021“…Recently, due to the enhancement of computing capabilities, the increase of the big data use, and the development of effective algorithms, the deep learning (DL) tool has witnessed a great success in data science. …”
-
250
A hybrid heuristic approach to optimize rule based software quality estimation models. (c2008)
Published 2008Get full text
Get full text
masterThesis -
251
Advancing Data Center Networks: A Focus on Energy and Cost Efficiency
Published 2023“…<p dir="ltr">Data centers serve as the backbone for cloud computing, enterprise services, and infrastructure-based offerings. …”
-
252
An image processing and genetic algorithm-based approach for the detection of melanoma in patients
Published 2018“…The second phase classifies lesions using a Genetic Algorithm. Our technique shows a significant improvement over other well-known algorithms and proves to be more stable on both training and testing data.…”
Get full text
Get full text
Get full text
Get full text
article -
253
An ant colony optimization algorithm to improve software quality prediction models
Published 2011“…We use an ant colony optimization algorithm in the adaptation process. …”
Get full text
Get full text
Get full text
article -
254
Multi-marker-LD based genetic algorithm for tag SNP selection
Published 2014“…The performance of the three algorithms are compared with those of a recognized tag SNP selection algorithm using three different real data sets from the HapMap project. …”
Get full text
Get full text
Get full text
article -
255
A Recommended Replacement Algorithm for the Scalable Asynchronous Cache Consistency Scheme
Published 2018Get full text
Get full text
Get full text
Get full text
conferenceObject -
256
A Modular Reconfigurable Architecture for Asymmetric and Symmetric-key Cryptographic Algorithms
Published 2007“…Numerous such algorithms have been devised, and many have found popularity in different domains. …”
Get full text
masterThesis -
257
Convergence and steady-state analysis of the normalized least mean fourth algorithm
Published 2007“…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …”
article -
258
Convergence and steady-state analysis of the normalized least mean fourth algorithm
Published 2007“…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …”
Get full text
article -
259
-
260