بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
search » research (توسيع البحث)
element » elements (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
search » research (توسيع البحث)
element » elements (توسيع البحث)
-
221
An image processing and genetic algorithm-based approach for the detection of melanoma in patients
منشور في 2018"…The second phase classifies lesions using a Genetic Algorithm. Our technique shows a significant improvement over other well-known algorithms and proves to be more stable on both training and testing data.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
222
An ant colony optimization algorithm to improve software quality prediction models
منشور في 2011"…We use an ant colony optimization algorithm in the adaptation process. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
223
Multi-marker-LD based genetic algorithm for tag SNP selection
منشور في 2014"…The performance of the three algorithms are compared with those of a recognized tag SNP selection algorithm using three different real data sets from the HapMap project. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
224
A Novel Hybrid Genetic-Whale Optimization Model for Ontology Learning from Arabic Text
منشور في 2019"…The previously published research on Arabic ontology learning from text falls into three categories: developing manually hand-crafted rules, using ordinary supervised/unsupervised machine learning algorithms, or a hybrid of these two approaches. …"
احصل على النص الكامل
احصل على النص الكامل
-
225
-
226
Convergence and steady-state analysis of the normalized least mean fourth algorithm
منشور في 2007"…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …"
article -
227
Convergence and steady-state analysis of the normalized least mean fourth algorithm
منشور في 2007"…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …"
احصل على النص الكامل
article -
228
-
229
Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms
منشور في 2022"…The outcomes revealed that these ML algorithms can be useful in predicting ground losses during wild blueberry harvesting in the selected fields.…"
-
230
Advancing Data Center Networks: A Focus on Energy and Cost Efficiency
منشور في 2023"…These topologies must incorporate fault-tolerant and efficient routing algorithms. Consequently, the data center network topology must dynamically adapt to ever-changing application requirements. …"
-
231
-
232
Automatic keyword extraction from a real estate classifieds data set
منشور في 2011"…With the increasing amount of information, it also becomes an area of interest on how to make online search easier. Keywords are considered to be a solution to this problem and are now widely used to search the information over the internet.In this project we analyze a real estate classifieds data set, with an objective to find keywords that represent this data set. …"
احصل على النص الكامل
-
233
Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las...
منشور في 2020"…A library of possible mother wavelets was designed based on the experimental data. As the inci dent wave for each sensing point varies because of the physical condition of the rail surface and the laser excitation, the algorithm automatically picks the mother wavelet from the library that generates the lar gest absolute cross-correlation with the incident wave. …"
احصل على النص الكامل
-
234
Wearable wrist to finger photoplethysmogram translation through restoration using super operational neural networks based 1D-CycleGAN for enhancing cardiovascular monitoring
منشور في 2024"…TTR-GAN comprises cascaded dual-stage 1D Cycle Generative Adversarial Networks (1D-CycleGANs) constructed using Super-ONNs. In the first phase, corrupted wPPG waveforms are blindly restored using a 1D-CycleGAN-based restoration framework. …"
-
235
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
منشور في 2024"…Moreover, the DBRF classification model is deployed to categorize the normal and attacking data flows using optimized features. Here, the proposed DRF-DBRF security model's performance is validated and tested using five different and popular IoT benchmarking datasets. …"
-
236
LaScaDa: A Novel Scalable Topology for Data Center Network
منشور في 2020"…LaScaDa forwards packets between nodes using a new hierarchical row-based routing algorithm. …"
-
237
Heat rate curve approximation for power plants without data measuring devices
منشور في 2012"…The method is applied on a given power system, in which we calculate the electricity cost using the CAPSE (computer aided power economics) algorithm. …"
احصل على النص الكامل
article -
238
UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices
منشور في 2019"…The global evolution of wireless technologies and intelligent sensing devices are transforming the realization of smart cities. Among the myriad of use cases, there is a need to support applications whereby low-resource Internet of Things (IoT) devices need to upload their sensor data to a remote control centre by target hard deadlines; otherwise, the data becomes outdated and loses its value, for example, in emergency or industrial control scenarios. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
239
RHEEMix in the data jungle: a cost-based optimizer for cross-platform systems.
منشور في 2020"…Our main contributions are: (i) a mechanism based on graph transformations to explore alternative execution strategies; (ii) a novel graph-based approach to determine efficient data movement plans among subtasks and platforms; and (iii) an efficient plan enumeration algorithm, based on a novel enumeration algebra. …"
-
240
Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection
منشور في 2011"…In order to analyze the performance of machine learning algorithms, data was provided by a bank to be used for educational purposes and shall remain undisclosed. …"
احصل على النص الكامل