Search alternatives:
learning algorithm » learning algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
low algorithm » rd algorithm (Expand Search), colony algorithm (Expand Search)
level using » level fusion (Expand Search)
Showing 61 - 80 results of 223 for search '(((( elements learning algorithm ) OR ( complement low algorithm ))) OR ( level using algorithm ))', query time: 0.13s Refine Results
  1. 61

    A multi-class discriminative motif finding algorithm for autosomal genomic data. (c2015) by Wehbe, Gioia Wahib

    Published 2016
    “…These discriminative motifs can be further studied to understand their role both at the evolutionary and disease levels.…”
    Get full text
    Get full text
    masterThesis
  2. 62

    A Parallel Genetic Algorithm for the Geometrically Constrained Site Layout Problem with Unequal-Size Facilities by Zouein, Pierrette P.

    Published 2010
    “…Parallel genetic algorithms techniques have been used in a variety of computer engineering and science areas. …”
    Get full text
    Get full text
    Get full text
    article
  3. 63
  4. 64

    Integrated economic and environmental models for a multi stage cold supply chain under carbon tax regulation by Hariga, Moncer

    Published 2017
    “…The elevated level of public and organizations awareness concerning sustainability has necessitated the adoption of environmentally conscious practices in the management of supply chains. …”
    Get full text
    article
  5. 65

    Sensitivity analysis and genetic algorithm-based shear capacity model for basalt FRC one-way slabs reinforced with BFRP bars by Abathar Al-Hamrani (16494884)

    Published 2023
    “…However, FRP-reinforced concrete (RC) structures exhibit less ductile response compared to steel RC structures. Recently, the use of basalt fiber reinforced concrete (BFRC) reinforced with BFRP bars was investigated to achieve a reasonable level of ductility in BFRC-BFRP one-way slabs. …”
  6. 66
  7. 67
  8. 68
  9. 69
  10. 70

    The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions by Abdulmalik Alwarafy (17984104)

    Published 2022
    “…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
  11. 71

    Simultaneous stabilisation of power systems using geneticalgorithms by Abdel-Magid, Y.L.

    Published 1997
    “…The paper considers the simultaneous stabilisation of a power system over a wide range of operating conditions via a single power system stabiliser using genetic algorithms. A power system operating at various load levels is treated as a finite set of plants. …”
    Get full text
    Get full text
    article
  12. 72
  13. 73

    Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey by Faria Nawshin (21841598)

    Published 2024
    “…As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. There are many machine-learning and deep-learning algorithms have been developed by researchers. …”
  14. 74

    A Survey of Data Clustering Techniques by Sobeh, Salma

    Published 2023
    “…This survey examines seven widely recognized clustering techniques, namely k-means, G-means, DBSCAN, Agglomerative hierarchical clustering, Two-stage density (DBSCAN and k-means) algorithm, Two-levels (DBSCAN and hierarchical) clustering algorithm, and Two-stage MeanShift and K-means clustering algorithm and compares them over a real dataset - The Blockchain dataset, including prominent cryptocurrencies like Binance, Bitcoin, Doge, and Ethereum, under several metrics such as silhouette coefficient, Calinski-Harabasz, Davies-Bouldin Index, time complexity, and entropy.…”
    Get full text
    Get full text
    Get full text
    masterThesis
  15. 75

    Efficient Seismic Volume Compression using the Lifting Scheme by Khene, M. F.

    Published 2000
    “…A separable 3-D discrete wavelet transform (DWT) using long biorthogonal filters is used. The computation efficiency of the DWT is improved by factoring the wavelet filters using the lifting scheme. …”
    Get full text
    article
  16. 76

    Cyberbullying Detection in Arabic Text using Deep Learning by ALBAYARI, REEM RAMADAN SA’ID

    Published 2023
    “…Therefore, this study aims to evaluate several versions of Recurrent Neural Networks (RNNs) and Feedforward Neural Networks (FNNs) for detecting cyberbullying in the Arabic language. Although these algorithms are widely used in text classification and outperform the performance of classical classifiers, many have been extensively investigated in other domains such as sentiment analysis and dialect identification, as well as cyberbullying detection in English text. …”
    Get full text
  17. 77
  18. 78
  19. 79

    Modulation With Metaheuristic Approach for Cascaded-MPUC49 Asymmetrical Inverter With Boosted Output by Kaif Ahmed Lodi (16855518)

    Published 2020
    “…For the calculation of optimum angles, a meta-heuristic based Genetic Algorithm (GA) technique is employed. The generation of 49-level output requires 24 transitions in one quarter of a cycle. …”
  20. 80