Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
light processing » signal processing (Expand Search), text processing (Expand Search), melt processing (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
light processing » signal processing (Expand Search), text processing (Expand Search), melt processing (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
-
61
A SIMULATED ANNEALING ALGORITHM FOR THE CLUSTERING PROBLEM
Published 2020“…In this paper we discuss the solution of the clustering problem usually solved by the K-means algorithm. The problem is known to have local minimum solutions which are usually what the K-means algorithm obtains. …”
Get full text
article -
62
Particle swarm optimization algorithm: review and applications
Published 2024“…The main procedure of the PSO algorithm is presented. Future researchers can use the collected data in this survey as baseline information on the PSO and PSO's applications.…”
Get full text
-
63
NEW ALGORITHMS FOR SOLVING THE FUZZY CLUSTERING PROBLEM
Published 2020“…Two new algorithms for fuzzy clustering are presented. Convergence of the proposed algorithms is proved. …”
Get full text
article -
64
Spider monkey optimizations: application review and results
Published 2024“…Optimization algorithms are applied to find efficient solutions in different problems in several fields such as the routing in wireless networks, cloud computing, big data, image processing and scheduling, and so forth. …”
Get full text
-
65
Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements
Published 2023“…<p dir="ltr">This work proposes an original preconditioner that couples the Constrained Pressure Residual (CPR) method with block preconditioning for the efficient solution of the linearized systems of equations arising from fully implicit multiphase flow models. …”
-
66
Evolutionary algorithm for predicting all-atom protein structure
Published 2011“…We present an improved version of a scatter search (SS) algorithm for predicting all-atoms protein structures using a recent energy model. …”
Get full text
Get full text
Get full text
conferenceObject -
67
Capturing outline of fonts using genetic algorithm and splines
Published 2001“…Hence, it is very difficult to obtain a global optima. We present a method to convert the original problem into a discrete combinatorial optimization problem and solve it by a genetic algorithm. …”
Get full text
Get full text
article -
68
Intelligent Rapidly-Exploring Random Tree Star Algorithm
Published 2024Get full text
doctoralThesis -
69
The effects of data balancing approaches: A case study
Published 2023“…In this article, we present a case study approach for investigating the effects of data balancing approaches. …”
-
70
An improved quorum selection algorithm (IQSA). (c2007)
Published 2007Get full text
Get full text
masterThesis -
71
Convergence behavior of the normalized least mean fourth algorithm
Published 2000“…The normalized least mean fourth (NLMF) algorithm is presented in this work and shown to have potentially faster convergence. …”
Get full text
Get full text
article -
72
A FAMILY OF NORMALIZED LEAST MEAN FOURTH ALGORITHMS
Published 2020“…In this work, a family of normalized least mean fourth algorithms is presented. Unlike the LMF algorithm, the convergence behavior of these algorithms is independent of the input data correlation statistics. …”
Get full text
article -
73
Correlation Clustering via s-Club Cluster Edge Deletion
Published 2023Get full text
Get full text
Get full text
masterThesis -
74
Indexing Arabic texts using association rule data mining
Published 2019“…The model denotes extracting new relevant words by relating those chosen by previous classical methods to new words using data mining rules. Design/methodology/approach The proposed model uses an association rule algorithm for extracting frequent sets containing related items – to extract relationships between words in the texts to be indexed with words from texts that belong to the same category. …”
Get full text
Get full text
Get full text
Get full text
article -
75
A method for data path synthesis using neural networks
Published 2017“…Presents a deterministic parallel algorithm to solve the data path allocation problem in high-level synthesis. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
76
Second-order conic programming for data envelopment analysis models
Published 2022“…This paper constructs a second-order conic optimization problem unifying several DEA models. Moreover, it presents an algorithm that solves the former problem, and provides a MATLAB function associated with it. …”
Get full text
Get full text
-
77
Big Data Energy Management, Analytics and Visualization for Residential Areas
Published 2020“…A high-speed distributed computing cluster based on commodity hardware with efficient big data mathematical algorithm is employed in this work. …”
Get full text
article -
78
Data mining approach to predict student's selection of program majors
Published 2019“…The approach includes a methodology to manage data mining projects, sampling techniques to handle imbalanced data and multiclass data, a set of classification algorithms to predict and measures to evaluate performance of models. …”
Get full text
-
79
Evolutionary algorithms for state justification in sequential automatic test pattern generation
Published 2005“…A common search operation in sequential Automatic Test Pattern Generation is to justify a desired state assignment on the sequential elements. State justification using deterministic algorithms is a difficult problem and is prone to many backtracks, which can lead to high execution times. …”
Get full text
article -
80
A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques
Published 2022“…None of the surveys have ever comprehensively studied the use of Natural Language Processing (NLP) techniques for detection of phishing except one that shed light on the use of NLP techniques for classification and training purposes, while exploring a few alternatives. …”
Get full text
Get full text