-
561
Tuning of a fuzzy logic power system stabilizer using geneticalgorithms
Published 1997“…The proposed approach uses genetic algorithms (GA) to search for optimal or near optimal settings of fuzzy logic power system stabilizer (FLPSS) parameters. …”
Get full text
Get full text
article -
562
Towards Multimedia Fragmentation
Published 2006“…We particularly discuss multimedia primary horizontal fragmentation and provide a partitioning strategy based on low-level multi-media features. Our approach particularly emphasizes the importance of multimedia predicates implications in optimizing multimedia fragments. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
563
Enhancement of SAR Speckle Denoising Using the Improved Iterative Filter
Published 2020Get full text
article -
564
Predicting Android Malware Using Evolution Networks
Published 2025“…We combine this model with genetic algorithms to optimize its parameters and return the best state transition probabilities, and we predict future malware accordingly. …”
Get full text
Get full text
Get full text
masterThesis -
565
SemIndex: Semantic-Aware Inverted Index
Published 2017“…Preliminary results have demonstrated the effectiveness, scalability and optimality of our approach.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
566
A fine-grained XML structural comparison approach
Published 2007“…Our approach consists of two main algorithms for discovering the structural commonality between sub-trees and computing tree-based edit operations costs. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
567
Precision nutrition: A systematic literature review
Published 2021“…As such, recent research has applied machine learning algorithms, tools, and techniques in precision nutrition for different purposes. …”
-
568
-
569
An XML Document Comparison Framework
Published 2001“…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
Get full text
Get full text
Get full text
article -
570
A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques
Published 2022“…The findings include that the main research area in phishing detection studies is feature extraction and selection, followed by methods for classifying and optimizing the detection of phishing emails. Amongst the range of classification algorithms, support vector machines (SVMs) are heavily utilised for detecting phishing emails. …”
Get full text
Get full text
-
571
Applications of artificial intelligence in emergency and critical care diagnostics: a systematic review and meta-analysis
Published 2024“…It uses various models and algorithms to detect patterns and specific findings to diagnose a disease with utmost accuracy. …”
-
572
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
Published 2023“…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …”
-
573
Distinguishing Between Fake and Real Smiles Using EEG Signals and Deep Learning
Published 2020Get full text
doctoralThesis -
574
Current trends and future orientation in diagnosing lung pathologies: A systematic survey
Published 2025“…Additionally, it emphasized the necessity for further research to optimize their performance and clinical usefulness.…”
Get full text
Get full text
Get full text
article -
575
Deep and transfer learning for building occupancy detection: A review and comparative analysis
Published 2022“…Moreover, the paper conducted a comparative study of the readily available algorithms for occupancy detection to determine the optimal method in regards to training time and testing accuracy. …”