Search alternatives:
using algorithm » cosine algorithm (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
level using » level fusion (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
element » elements (Expand Search)
using algorithm » cosine algorithm (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
level using » level fusion (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
element » elements (Expand Search)
-
141
Optimizing microgrid efficiency: Coordinating commercial and residential demand patterns with shared battery energy storage
Published 2024“…Utilizing a Firefly Algorithm (FA) for optimization, the study determines the optimized BESS capacity for minimum total cost. …”
-
142
Efficient Seismic Volume Compression using the Lifting Scheme
Published 2000“…A separable 3-D discrete wavelet transform (DWT) using long biorthogonal filters is used. The computation efficiency of the DWT is improved by factoring the wavelet filters using the lifting scheme. …”
Get full text
article -
143
Cyberbullying Detection in Arabic Text using Deep Learning
Published 2023“…Therefore, this study aims to evaluate several versions of Recurrent Neural Networks (RNNs) and Feedforward Neural Networks (FNNs) for detecting cyberbullying in the Arabic language. Although these algorithms are widely used in text classification and outperform the performance of classical classifiers, many have been extensively investigated in other domains such as sentiment analysis and dialect identification, as well as cyberbullying detection in English text. …”
Get full text
-
144
-
145
FPGA-Based Network Traffic Classification Using Machine Learning
Published 2019Get full text
doctoralThesis -
146
Modulation With Metaheuristic Approach for Cascaded-MPUC49 Asymmetrical Inverter With Boosted Output
Published 2020“…For the calculation of optimum angles, a meta-heuristic based Genetic Algorithm (GA) technique is employed. The generation of 49-level output requires 24 transitions in one quarter of a cycle. …”
-
147
-
148
-
149
FPGA-Based Network Traffic Classification Using Machine Learning
Published 2020“…Classification approaches based on machine learning techniques have shown promising results with high levels of accuracy. In this paper, the suitability of packet-level and flow-level features is validated using stepwise regression and random forest feature selection. …”
Get full text
article -
150
An efficient approach for textual data classification using deep learning
Published 2022“…<p dir="ltr">Text categorization is an effective activity that can be accomplished using a variety of classification algorithms. In machine learning, the classifier is built by learning the features of categories from a set of preset training data. …”
-
151
-
152
A Graph Heuristic Approach for the Data Path Allocation Problem
Published 2022“…To optimize this allocation problem, a variation of the Fiduccia-Mattheyses (FM) algorithm is presented. The algorithm starts with a schedule as input and partitions it into available hardware resources using a modifi ed version of the Fiduccia-Mattheyses algorithm to t the datapath allocation problem. …”
Get full text
Get full text
Get full text
masterThesis -
153
Nonlinear Control of Brushless Dual-Fed Induction Generator With a Flywheel Energy Storage System for Improved System Performance
Published 2025“…In the first stage, a robust Sliding Mode Control (SMC)-based nonlinear decoupled control algorithm is designed to efficiently regulate BDFIG operation. …”
-
154
Artificial Intelligence for the Prediction and Early Diagnosis of Pancreatic Cancer: Scoping Review
Published 2023“…A higher level of accuracy (99%) was found in studies that used support vector machine, decision trees, and k-means clustering algorithms. …”
-
155
Correlation Clustering via s-Club Cluster Edge Deletion
Published 2023“…In addition, we implement this 3CCED algorithm in the heuristic approach and compare the experiments to Cluster Editing and 2CCED. …”
Get full text
Get full text
Get full text
masterThesis -
156
Customs Trade Facilitation and Compliance for Ecommerce using Blockchain and Data Mining
Published 2021“…Additionally, the Cross Industry Standard Process for Data Mining (CRISP-DM) methodology is employed for modelling the two proposed clustering algorithms to identify transactional risks. The usability of the proposed framework is evaluated using the System Usability Scale (SUS) resulting in overall high acceptability levels across all users. …”
Get full text
-
157
Joint distributed synchronization and positioning in UWB ad hoc networks using TOA
Published 2006“…Finally, the proposed distributed maximum log-likelihood algorithm proves to preserve a reasonable level of complexity in each node by approximating asynchronously the positive gradient direction of the log-likelihood function. …”
Get full text
Get full text
Get full text
article -
158
Developing a UAE-Based Disputes Prediction Model using Machine Learning
Published 2022Get full text
doctoralThesis -
159
Exploiting Sparsity in Amplify-and-Forward Broadband Multiple Relay Selection
Published 2019“…In particular, by separating all the subcarriers or some subcarrier groups from each other and by optimizing the selection and beamforming vector(s) using OMP algorithm, a higher level of frequency diversity can be achieved. …”
-
160
Using artificial intelligence to improve body iron quantification: A scoping review
Published 2023“…The search revealed a wide range of machine learning algorithms used by different studies. Notably, most studies used a single data type. …”