Search alternatives:
using algorithm » cosine algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
element » elements (Expand Search)
using algorithm » cosine algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
element » elements (Expand Search)
-
261
Experimental Investigation and Comparative Evaluation of Standard Level Shifted Multi-Carrier Modulation Schemes With a Constraint GA Based SHE Techniques for a Seven-Level PUC Inv...
Published 2019“…Different standard multicarrier sinusoidal pulse-width modulation techniques (SPWMs) are adapted for the generation of switching gate signals for the PUC power switches, and these SPWMs are compared with novel optimization-based selective harmonic elimination (SHE) that employs genetic algorithm (GA) for solving nonlinear SHE equation with a constraint that eliminated all third-order harmonics efficiently. …”
-
262
A new family of multi-step quasi-Newton algorithms for unconstrained optimization
Published 1999“…It concentrates on deriving a variable-metric family of minimum curvature algorithms for unconstrained optimization. The derivation is based on considering a rational model, with a certain tuning parameter, where the aim is to develop a general framework that encompasses all possible two-step minimum curvature algorithms generated by appropriate parameter choices. …”
Get full text
Get full text
article -
263
Wearable wrist to finger photoplethysmogram translation through restoration using super operational neural networks based 1D-CycleGAN for enhancing cardiovascular monitoring
Published 2024“…TTR-GAN comprises cascaded dual-stage 1D Cycle Generative Adversarial Networks (1D-CycleGANs) constructed using Super-ONNs. In the first phase, corrupted wPPG waveforms are blindly restored using a 1D-CycleGAN-based restoration framework. …”
-
264
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…Moreover, the DBRF classification model is deployed to categorize the normal and attacking data flows using optimized features. Here, the proposed DRF-DBRF security model's performance is validated and tested using five different and popular IoT benchmarking datasets. …”
-
265
LaScaDa: A Novel Scalable Topology for Data Center Network
Published 2020“…LaScaDa forwards packets between nodes using a new hierarchical row-based routing algorithm. …”
-
266
Heat rate curve approximation for power plants without data measuring devices
Published 2012“…The method is applied on a given power system, in which we calculate the electricity cost using the CAPSE (computer aided power economics) algorithm. …”
Get full text
article -
267
RHEEMix in the data jungle: a cost-based optimizer for cross-platform systems.
Published 2020“…Our main contributions are: (i) a mechanism based on graph transformations to explore alternative execution strategies; (ii) a novel graph-based approach to determine efficient data movement plans among subtasks and platforms; and (iii) an efficient plan enumeration algorithm, based on a novel enumeration algebra. …”
-
268
-
269
Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection
Published 2011“…In order to analyze the performance of machine learning algorithms, data was provided by a bank to be used for educational purposes and shall remain undisclosed. …”
Get full text
-
270
-
271
UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks
Published 2018“…Among the emerging markets, Internet of Things (IoT) use cases are standing out with the proliferation of a wide range of sensors that can be configured to continuously monitor and transmit data for intelligent processing and decision making. …”
Get full text
Get full text
Get full text
Get full text
article -
272
A data envelopment analysis model for opinion leaders’ identification in social networks
Published 2024“…Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. …”
-
273
BioNetApp: An interactive visual data analysis platform for molecular expressions
Published 2019“…BioNetApp also provides data clustering based on molecular concentrations using Self Organizing Maps (SOM), K-Means, K-Medoids, and Farthest First algorithms.…”
-
274
Automatic keyword extraction from a real estate classifieds data set
Published 2011“…We begin with designing data cleansing algorithms to verify different attributes of the real estate classified. …”
Get full text
-
275
Data Endowment as a Digital Waqf: An Islamic Ethical Framework for AI Development
Published 2025“…<p dir="ltr">In the era of artificial intelligence (AI), data is often called the new oil—an essential asset for training algorithms and fueling intelligent systems. …”
-
276
-
277
UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data
Published 2024“…To overcome these challenges, a new FS algorithm named Uniform-solution-driven Binary Feature Selection (UniBFS) has been developed in this study. …”
-
278
SemIndex+: A semantic indexing scheme for structured, unstructured, and partly structured data
Published 2018“…Various weighting functions and a parallelized search algorithm have been developed for that purpose and are presented here. …”
Get full text
Get full text
Get full text
Get full text
article -
279
-
280