Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
experiments 1 » experimental _ (Expand Search)
c3 algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
1 algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
experiments 1 » experimental _ (Expand Search)
c3 algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
1 algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search)
-
41
A Hybrid Deep Learning Model Using CNN and K-Mean Clustering for Energy Efficient Modelling in Mobile EdgeIoT
Published 2023“…This research proposed a hybrid model for energy-efficient cluster formation and a head selection (E-CFSA) algorithm based on convolutional neural networks (CNNs) and a modified k-mean clustering (MKM) method for MEC. …”
-
42
-
43
Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images
Published 2023“…Lung-EffNet is evaluated by utilizing five variants of EfficientNet i.e., B0–B4. The experiments are conducted on the benchmark dataset “IQ-OTH/NCCD” for lung cancer patients grouped as benign, malignant, or normal based on the presence or absence of lung cancer. …”
-
44
Boosting the visibility of services in microservice architecture
Published 2023“…Our research also analyzed the boosting algorithms, namely Gradient Boost, XGBoost, LightGBM, and CatBoost to improve the overall performance. …”
-
45
Correlation Clustering via s-Club Cluster Edge Deletion
Published 2023“…We run these algorithms and cross-compare the three experiment results to the fastest Cluster Editing algorithm which runs in O(1.62k) time. …”
Get full text
Get full text
Get full text
masterThesis -
46
Mixed precision iterative refinement with adaptive precision sparse approximate inverse preconditioning
Published 2025“…<p dir="ltr">Hardware trends have motivated the development of mixed precision algorithms in numerical linear algebra, which aim to decrease runtime while maintaining acceptable accuracy. …”
-
47
A clustering metaheuristic for large orienteering problems
Published 2022“…We have validated the effectiveness of the proposed metaheuristic design through a set of computational experiments. In particular, using a state-of-the-art heuristic and an exact algorithm, we have shown that it is significantly beneficial to use the Orienteering Problem algorithm plugged into our metaheuristic, as opposed to using it as a standalone algorithm. …”
-
48
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …”
Get full text
-
49
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
Published 2022“…On the other hand, the transfer learning skills demonstrated in this study indicate that discovering suitable testing models from the ground is also achievable using our model with optimum prior cryptographic expertise, where we contribute the results of deep learning in the field of deep learning based differential cryptanalysis development.Various experiments were performed on discrete and continuous chaotic and non-chaotic permutation patterns, and the best-performing model had an MSE of 1.8217e−04 and an R2 of 1, demonstrating the practicality of the suggested technique.…”
-
50
Improving MRI Resolution: A Cycle Consistent Generative Adversarial Network-Based Approach for 3T to 7T Translation
Published 2024“…Efforts are underway to develop algorithms that can generate 7T MRI from 3T MRI to achieve better image quality without the need for 7T MRI machines. …”
-
51
-
52
-
53
Clustering records in information retrieval systems. (c1995)
Published 1995Get full text
Get full text
masterThesis -
54
Inception voltage of corona in bipolar ionized fields-effect oncorona power loss
Published 1996“…Comparison with previously computed V-I characteristics showed that the present computed values were in better agreement with experiments. …”
Get full text
Get full text
article -
55
Parallel tabu search in a heterogeneous environment
Published 2003Get full text
Get full text
article -
56
Performance driven standard-cell placement using the geneticalgorithm
Published 1995Get full text
Get full text
article -
57
Benchmark on a large cohort for sleep-wake classification with machine learning techniques
Published 2019“…The performance, in regards to accuracy and F1 score of the machine learning algorithms, was also superior to the device’s native algorithm and comparable to human annotation. …”
-
58
LOCATING DAMAGES IN THIN ALUMINIUM PLATES USING LAMB WAVES AND AGENETIC OPTIMIZATION APPROACH
Published 2021“…The damage locations are further optimized within the enclosed area using the GO algorithm. The optimized results of damage well correspond with the actual ones and thus manifest the ability of the proposed approach for locating different types of defects in an Al specimen using a sparse array of permanently installed PW transducers.…”
Get full text
-
59
Recent Advances in Harris Hawks Optimization: A Comparative Study and Applications
Published 2022“…Moreover, several experiments were carried out to prove the powerfulness and effectivness of HHO compared with nine other state-of-art algorithms using Congress on Evolutionary Computation (CEC2005) and CEC2017. …”
Get full text
-
60
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
Published 2022“…Fifth, it is also observed that the actuation and sensing position plays a crucial role in receiving the time-domain data with a sufficient SNR and the one that is easy to analyze and interpret. Based on the numerous experiments, an optimum distance of inspection is estimated which yields damage detection and localization with high accuracy thereby solving all the aforementioned issues. …”
Get full text