Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
-
181
(k, l)-Clustering for Transactional Data Streams Anonymization
Published 2018Get full text
Get full text
Get full text
Get full text
conferenceObject -
182
Application of Data Mining to Predict and Diagnose Diabetic Retinopathy
Published 2024Get full text
doctoralThesis -
183
Allocating data to distributed-memory multiprocessors by genetic algorithms
Published 2016“…The last two are based on models of natural evolution that are suitable for parallel implementation; they have been implemented on a hypercube and a Connection Machine. …”
Get full text
Get full text
Get full text
article -
184
Global smart cities classification using a machine learning approach to evaluating livability, technology, and sustainability performance across key urban indices
Published 2025“…Drawing on data from the Smart Cities Index (SCI) and other economic and sustainability competitiveness metrics, the study uses various <u>ML algorithms</u> to categorize cities into <u>performance classes</u>, ranging from high-achieving Class 1 to emerging Class 3 cities. …”
-
185
Spectrum Sensing Algorithms for Cooperative Cognitive Radio Networks
Published 2010Get full text
doctoralThesis -
186
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
Get full text
-
187
IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture
Published 2025“…The IoMT manufacturers need to offer their products at a competitive price, which forces them to use simplified architecture, leaving limited and, to some extent, no scope to employ sophisticated cybersecurity algorithms. …”
-
188
A comparison of optimization heuristics for the data mapping problem
Published 1997“…In this paper we compare the performance of six heuristics with suboptimal solutions for the data mapping problem of two dimensional meshes that are used for the numerical solution of Partial Differential Equations(PDEs) on multicomputers. …”
Get full text
Get full text
Get full text
article -
189
Data redundancy management for leaf-edges in connected environments
Published 2022“…Although the sensed data could be useful for various applications (e.g., event detection in cities, energy management in commercial buildings), it first requires pre-processing to clean various inconsistencies (e.g., anomalies, redundancies, missing values). …”
Get full text
Get full text
Get full text
Get full text
article -
190
Exploring Semi-Supervised Learning Algorithms for Camera Trap Images
Published 2022Get full text
doctoralThesis -
191
Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures
Published 2025“…To determine the parameters of the regime switching model and identify when economic states change, we employ the EM algorithm, utilizing real gas futures price data. We validate our closed-form solution for the option pricing through simulations employing the generalized antithetic variates Monte-Carlo technique. …”
Get full text
article -
192
A fast exact sequential algorithm for the partial digest problem
Published 2016“…Two types of simulated data, random and Zhang, are used to measure the efficiency of the algorithm. …”
-
193
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006“…The algorithm is tested using 200 randomly generated 2-variable 4-valued functions. …”
Get full text
Get full text
article -
194
Simulated annealing and genetic algorithms for exam scheduling. (c1997)
Published 1997Get full text
Get full text
masterThesis -
195
Eye-Clustering: An Enhanced Centroids Prediction for K-means Algorithm
Published 2024“…Among these, K-means is widely used for efficiently solving clustering problems. …”
Get full text
Get full text
Get full text
masterThesis -
196
Second-order conic programming for data envelopment analysis models
Published 2022“…Data envelopment analysis (DEA) is a widely used benchmarking technique. …”
Get full text
Get full text
-
197
A Scatter search algorithm for exam scheduling. (c2006)
Published 2006Get full text
Get full text
masterThesis -
198
Real-Time Implementation of GPS Aided Low Cost Strapdown Inertial Navigation System
Published 2009Get full text
doctoralThesis -
199
A Tabu Search Algorithm For Maintenance Scheduling Of Generating Units
Published 2020“…The algorithm was developed, implemented and tested on an integrated model for the MS problem. …”
Get full text
article -
200
A Tabu Search Algorithm For Maintenance Scheduling Of Generating Units
Published 2020“…The algorithm was developed, implemented and tested on an integrated model for the MS problem. …”
Get full text
article