Search alternatives:
processing algorithm » processing algorithms (Expand Search)
research algorithm » search algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
processing algorithm » processing algorithms (Expand Search)
research algorithm » search algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
-
141
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
142
-
143
Power System Transient Stability Assessment Based on Machine Learning Algorithms and Grid Topology
Published 2023“…In this study, the emergency control algorithms based on ensemble machine learning algorithms (XGBoost and Random Forest) were developed for a low-inertia power system. …”
Get full text
article -
144
A Data-Driven Decision-Making Framework for Fleet Management in the Government Sector of Dubai
Published 2024“…My research aims to develop a data-driven decision support framework for fleet management, focusing on leveraging advanced algorithms, including decision trees and random forests, to generate domain-specific AI models. …”
Get full text
-
145
A flexible genetic algorithm-fuzzy regression approach for forecasting: The case of bitumen consumption
Published 2019“…Design/methodology/approach In the proposed approach, the parameter tuning process is performed on all parameters of genetic algorithm (GA), and the finest coefficients with minimum errors are identified. …”
Get full text
Get full text
Get full text
Get full text
article -
146
-
147
Developing an online hate classifier for multiple social media platforms
Published 2020“…We make our code publicly available for application in real software systems as well as for further development by online hate researchers.</p><h2>Other Information</h2> <p> Published in: Human-centric Computing and Information Sciences<br> License: <a href="https://creativecommons.org/licenses/by/4.0" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="http://dx.doi.org/10.1186/s13673-019-0205-6" target="_blank">http://dx.doi.org/10.1186/s13673-019-0205-6</a></p>…”
-
148
-
149
-
150
Prediction the performance of multistage moving bed biological process using artificial neural network (ANN)
Published 2020“…To cope with this difficult task and perform an effective and well-controlled BP operation, an artificial neural network (ANN) algorithm was developed to simulate, model, and control a three-stage (anaerobic/anoxic and MBBR) enhanced nutrient removal biological process (ENR-BP) challenging real wastewater. …”
-
151
KNNOR: An oversampling technique for imbalanced datasets
Published 2021“…The proposed technique called K-Nearest Neighbor OveRsampling approach (KNNOR) performs a three step process to identify the critical and safe areas for augmentation and generate synthetic data points of the minority class. …”
-
152
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
Published 2023“…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …”
-
153
Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images
Published 2022“…Over the decade, numerous artificial neural network (ANN)-based techniques were adopted in order to diagnose and classify breast cancer due to the unique characteristics of learning key features from complex data via a training process. However, these schemes have limitations like slow convergence and longer training time. …”
-
154
-
155
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
Published 2007“…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …”
Get full text
Get full text
Get full text
article -
156
Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights
Published 2021“…Connecting the ubiquitous sensing and big data processing of critical information in infrastructures through the IoT paradigm is the future of SHM systems. …”
Get full text
article -
157
-
158
Application of updated joint detection algorithm for the analysis of drilling parameters of roof bolters in multiple joints conditions
Published 2017“…For this purpose, computer programs based on updated pattern recognition algorithms were developed for joint-detection and classification of rock types to offer an estimated strength. …”
Get full text
Get full text
Get full text
conferenceObject -
159
PILE-UP FREE PARAMETER ESTIMATION AND DIGITAL ONLINE PEAK LOCALIZATION ALGORITHMS FOR GAMMA RAY SPECTROSCOPY
Published 2020“…A fast waveform sampling facility has been recently developed and integrated into the VAX-based data acquisition system at the Energy Research Laboratory (ERL). …”
Get full text
article -
160