Search alternatives:
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
finding » findings (Expand Search)
element » elements (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
finding » findings (Expand Search)
element » elements (Expand Search)
-
221
A Genetic Algorithm for Improving Accuracy of Software Quality Predictive Models
Published 2010“…In this work, we present a genetic algorithm to optimize predictive models used to estimate software quality characteristics. …”
Get full text
Get full text
Get full text
article -
222
Novel Peak Detection Algorithms for Pileup Minimization in Gamma Ray Spectroscopy
Published 2006“…This study uses the above facility in developing algorithms for digitally determining the basic pulse parameters and tackling the problem of pulse pile-up in Gamma-ray spectroscopy. …”
Get full text
Get full text
article -
223
The buffered work-pool approach for search-tree based optimization algorithms
Published 2017“…Recent advances in algorithm design have shown a growing interest in seeking exact solutions to many hard problems. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
224
Real-Time Social Robot’s Responses to Undesired Interactions Between Children and their Surroundings
Published 2022“…Experiments with features showed that acceleration data were the most contributing factor on the prediction compared to gyroscope data and that combined data of raw and extracted features provided a better overall performance. …”
-
225
Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms
Published 2022“…The outcomes revealed that these ML algorithms can be useful in predicting ground losses during wild blueberry harvesting in the selected fields.…”
-
226
Advancing Data Center Networks: A Focus on Energy and Cost Efficiency
Published 2023“…These topologies must incorporate fault-tolerant and efficient routing algorithms. Consequently, the data center network topology must dynamically adapt to ever-changing application requirements. …”
-
227
Adapted arithmetic optimization algorithm for multi-level thresholding image segmentation: a case study of chest x-ray images
Published 2023“…These techniques work well for bi-level thresholding, but when used to find the appropriate thresholds for multi-level thresholding, there will be issues with long calculation times, high computational costs, and the need for accuracy improvements. …”
Get full text
-
228
-
229
A data envelopment analysis model for opinion leaders’ identification in social networks
Published 2024“…The graph-based methods are one of the most important approaches for finding OLs in OSNs. Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. …”
-
230
Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las...
Published 2020“…A library of possible mother wavelets was designed based on the experimental data. As the inci dent wave for each sensing point varies because of the physical condition of the rail surface and the laser excitation, the algorithm automatically picks the mother wavelet from the library that generates the lar gest absolute cross-correlation with the incident wave. …”
Get full text
-
231
Genetic Algorithm for Solving Site Layout Problem with Unequal-Size and Constrained Facilities
Published 2002“…In most problems considered where the total-objects-to-site-area ratio did not exceed 60%, the algorithm returned close to optimal solutions in a reasonable time.…”
Get full text
Get full text
Get full text
article -
232
Wearable wrist to finger photoplethysmogram translation through restoration using super operational neural networks based 1D-CycleGAN for enhancing cardiovascular monitoring
Published 2024“…TTR-GAN comprises cascaded dual-stage 1D Cycle Generative Adversarial Networks (1D-CycleGANs) constructed using Super-ONNs. In the first phase, corrupted wPPG waveforms are blindly restored using a 1D-CycleGAN-based restoration framework. …”
-
233
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…Moreover, the DBRF classification model is deployed to categorize the normal and attacking data flows using optimized features. Here, the proposed DRF-DBRF security model's performance is validated and tested using five different and popular IoT benchmarking datasets. …”
-
234
LaScaDa: A Novel Scalable Topology for Data Center Network
Published 2020“…LaScaDa forwards packets between nodes using a new hierarchical row-based routing algorithm. …”
-
235
Heat rate curve approximation for power plants without data measuring devices
Published 2012“…The method is applied on a given power system, in which we calculate the electricity cost using the CAPSE (computer aided power economics) algorithm. …”
Get full text
article -
236
RHEEMix in the data jungle: a cost-based optimizer for cross-platform systems.
Published 2020“…Our main contributions are: (i) a mechanism based on graph transformations to explore alternative execution strategies; (ii) a novel graph-based approach to determine efficient data movement plans among subtasks and platforms; and (iii) an efficient plan enumeration algorithm, based on a novel enumeration algebra. …”
-
237
-
238
Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection
Published 2011“…In order to analyze the performance of machine learning algorithms, data was provided by a bank to be used for educational purposes and shall remain undisclosed. …”
Get full text
-
239
BioNetApp: An interactive visual data analysis platform for molecular expressions
Published 2019“…BioNetApp also provides data clustering based on molecular concentrations using Self Organizing Maps (SOM), K-Means, K-Medoids, and Farthest First algorithms.…”
-
240