Search alternatives:
processing algorithm » processing algorithms (Expand Search)
test processing » text processing (Expand Search), melt processing (Expand Search)
rl algorithm » rd algorithm (Expand Search), carlo algorithm (Expand Search), _ algorithms (Expand Search)
element » elements (Expand Search)
processing algorithm » processing algorithms (Expand Search)
test processing » text processing (Expand Search), melt processing (Expand Search)
rl algorithm » rd algorithm (Expand Search), carlo algorithm (Expand Search), _ algorithms (Expand Search)
element » elements (Expand Search)
-
141
A non-convex economic load dispatch problem using chameleon swarm algorithm with roulette wheel and Levy flight methods
Published 2023“…In this paper, several enhancements were made to this algorithm. First, it’s position updating process was slightly tweaked and took advantage of the chameleons’ randomization as well as adopting several time-varying functions. …”
Get full text
-
142
-
143
A Novel Partitioned Random Forest Method-Based Facial Emotion Recognition
Published 2025“…Most improved RF versions modify attribute selection processes or combine them with other machine learning algorithms, increasing their complexity. …”
-
144
Multi-Objective Co-optimization of Power and Gas under Uncertainties with P2H embedded
Published 2022Get full text
doctoralThesis -
145
-
146
A flexible genetic algorithm-fuzzy regression approach for forecasting: The case of bitumen consumption
Published 2019“…Design/methodology/approach In the proposed approach, the parameter tuning process is performed on all parameters of genetic algorithm (GA), and the finest coefficients with minimum errors are identified. …”
Get full text
Get full text
Get full text
Get full text
article -
147
-
148
KNNOR: An oversampling technique for imbalanced datasets
Published 2021“…The proposed technique called K-Nearest Neighbor OveRsampling approach (KNNOR) performs a three step process to identify the critical and safe areas for augmentation and generate synthetic data points of the minority class. …”
-
149
-
150
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
Published 2023“…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …”
-
151
Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images
Published 2022“…Over the decade, numerous artificial neural network (ANN)-based techniques were adopted in order to diagnose and classify breast cancer due to the unique characteristics of learning key features from complex data via a training process. However, these schemes have limitations like slow convergence and longer training time. …”
-
152
Fuzzy Logic Adaptive Crow Search Algorithm for MPPT of a Partially Shaded Photovoltaic System
Published 2024“…Furthermore, a higher value of the fl is preferred to guide the optimization process in the direction of global search, whilst a lower fl value directs the algorithm in the direction of local search. …”
-
153
-
154
-
155
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
Published 2007“…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …”
Get full text
Get full text
Get full text
article -
156
Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights
Published 2021“…Connecting the ubiquitous sensing and big data processing of critical information in infrastructures through the IoT paradigm is the future of SHM systems. …”
Get full text
article -
157
-
158
-
159
Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators
Published 2021“…Datasets with such characteristics pose a challenge to machine learning algorithms. This is because they impede the training and testing process and entail high resource computations that deteriorate the classification performance. …”
Get full text
-
160
A localized navigation algorithm for radiation evasion for nuclear facilities: Optimizing the "Radiation Evasion" criterion: Part I
Published 2013“…The proposed algorithm is tested under the “Radiation Evasion” criterion. …”
Get full text
article