Search alternatives:
algorithm fa » algorithm _ (Expand Search), algorithms a (Expand Search), algorithms _ (Expand Search)
algorithm fa » algorithm _ (Expand Search), algorithms a (Expand Search), algorithms _ (Expand Search)
-
81
-
82
A Hybrid Transfer Learning Approach to Teeth Diagnosis Using Orthopantomogram Radiographs
Published 2024“…Fortunately, the availability of modern computing devices has made the automated diagnosis of teeth readily possible using deep learning. Despite this, concerns about the accuracy and function of automated diagnosis remain among patients. …”
Get full text
article -
83
Metaheuristic Algorithm for State-Based Software Testing
Published 2018“…We formulate the testing problem as an optimization problem and use a simulated annealing (SA) metaheuristic algorithm to generate test cases as sequences of events while keeping the test suite size reasonable. …”
Get full text
Get full text
Get full text
Get full text
article -
84
Radial basis function networks for contingency analysis of bulkpower systems
Published 1999“…Radial basis function networks (RBFNs) are used for contingency evaluation of bulk power system. …”
Get full text
Get full text
article -
85
Finite state machine state assignment for area and power minimization
Published 2006Get full text
Get full text
article -
86
A new genetic algorithm approach for unit commitment
Published 1997“…The problem under consideration includes two linked subproblems: a combinatorial optimization problem and a nonlinear programming problem. The former is solved using the proposed genetic algorithm while the latter problem is solved via a quadratic programming routine. …”
Get full text
Get full text
article -
87
Evolutionary algorithm for predicting all-atom protein structure
Published 2011“…We present an improved version of a scatter search (SS) algorithm for predicting all-atoms protein structures using a recent energy model. …”
Get full text
Get full text
Get full text
conferenceObject -
88
Belief selection in point-based planning algorithms for POMDPs
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
89
Improving the Secure Socket Layer Protocol by modifying its Authentication function
Published 2017“…The most common cryptographic algorithm used for this function is RSA. If we double the key length in RSA to have more secure communication, then it is known that the time needed for the encryption and decryption will be increased approximately eight times. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
90
Simultaneous stabilization of multimachine power systems viagenetic algorithms
Published 1999“…This paper demonstrates the use of genetic algorithms for the simultaneous stabilization of multimachine power systems over a wide range of operating conditions via single-setting power system stabilizers. …”
Get full text
Get full text
article -
91
Evolutionary algorithms for VLSI multi-objective netlist partitioning
Published 2006“…A series of experiments are performed to evaluate the efficiency of the algorithms. ISCAS-85/89 benchmark circuits are used and experimental results are reported and analyzed to compare the performance of GA, TS and SimE. …”
Get full text
article -
92
An Evolutionary Algorithm for the Allocation Problem in High-Level Synthesis
Published 2005“…The system handles multicycle functional units as well as structural pipelining. The proposed method was implemented using C++ on a Linux workstation. …”
Get full text
Get full text
Get full text
article -
93
A neural networks algorithm for data path synthesis
Published 2003“…The method formulates the allocation problem using the clique partitioning problem, an NP-complete problem, and handles multicycle functional units as well as structural pipelining. …”
Get full text
Get full text
Get full text
article -
94
A Comparative Study of Elgamal Based Cryptographic Algorithms
Published 2004“…In this work we implement the classical and modified ElGamal cryptosystem to compare and to test their functionality, reliability and security. To test the security of the algorithms we use a famous attack algorithm called Baby-Step-Giant algorithm which works in the domain of natural integers. …”
Get full text
Get full text
Get full text
conferenceObject -
95
Intelligent Bilateral Client Selection in Federated Learning Using Game Theory
Published 2022“…To overcome this problem, we present in this paper FedMint, an intelligent client selection approach for federated learning on IoT devices using game theory and bootstrapping mechanism. Our solution involves designing (1) preference functions for the client IoT devices and federated servers to allow them to rank each other according to several factors such as accuracy and price, (2) intelligent matching algorithms that take into account the preferences of both parties in their design, and (3) bootstrapping technique that capitalizes on the collaboration of multiple federated servers in order to assign initial accuracy value for the new connected IoT devices. …”
Get full text
Get full text
Get full text
masterThesis -
96
Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review
Published 2024“…Moreover, this study also addresses issues of adapting machine learning algorithms to accommodate the sensors’ functionalities in the network configuration. …”
-
97
AGEomics Biomarkers and Machine Learning—Realizing the Potential of Protein Glycation in Clinical Diagnostics
Published 2022“…AGEomics biomarkers have been used in diagnostic algorithms using machine learning methods. …”
-
98
Genetic and heuristic algorithms for regrouping service sites. (c2000)
Published 2000Get full text
Get full text
masterThesis -
99
Genetic Algorithm Based Simultaneous Eigenvalue Placement Of Power Systems
Published 2020“…This paper demonstrates the use of genetic algorithms to design a single output feedback control law for the simultaneous eigenvalue placement of a power system running over a wide range of operating conditions. …”
Get full text
article -
100
Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures
Published 2025“…We develop a semi-analytical method to determine the price of European options on these energy futures, involving the derivation of the characteristic function for the energy futures' dynamics. To determine the parameters of the regime switching model and identify when economic states change, we employ the EM algorithm, utilizing real gas futures price data. …”
Get full text
article