بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
element » elements (توسيع البحث)
يعرض 261 - 280 نتائج من 901 نتيجة بحث عن '(( data using algorithm ) OR ((( develop based algorithms ) OR ( element network algorithm ))))', وقت الاستعلام: 0.15s تنقيح النتائج
  1. 261

    An image processing and genetic algorithm-based approach for the detection of melanoma in patients حسب Tokajian, Sima

    منشور في 2018
    "…The second phase classifies lesions using a Genetic Algorithm. Our technique shows a significant improvement over other well-known algorithms and proves to be more stable on both training and testing data.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 262
  3. 263

    Multi-marker-LD based genetic algorithm for tag SNP selection حسب Mansour, Nashat

    منشور في 2014
    "…The performance of the three algorithms are compared with those of a recognized tag SNP selection algorithm using three different real data sets from the HapMap project. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 264
  5. 265

    Convergence and steady-state analysis of the normalized least mean fourth algorithm حسب Zerguine, Azzedine

    منشور في 2007
    "…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …"
    article
  6. 266

    Convergence and steady-state analysis of the normalized least mean fourth algorithm حسب Zerguine, Azzedine

    منشور في 2007
    "…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …"
    احصل على النص الكامل
    article
  7. 267
  8. 268

    Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms حسب Humna Khan (17541972)

    منشور في 2022
    "…The outcomes revealed that these ML algorithms can be useful in predicting ground losses during wild blueberry harvesting in the selected fields.…"
  9. 269

    UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices حسب Samir, Moataz

    منشور في 2019
    "…Then, we develop an effective sub-optimal algorithm based on successive convex approximation in order to obtain results for larger network scenarios. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 270
  11. 271

    A new family of multi-step quasi-Newton algorithms for unconstrained optimization حسب Obeid, Samir

    منشور في 1999
    "…It concentrates on deriving a variable-metric family of minimum curvature algorithms for unconstrained optimization. The derivation is based on considering a rational model, with a certain tuning parameter, where the aim is to develop a general framework that encompasses all possible two-step minimum curvature algorithms generated by appropriate parameter choices. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 272
  13. 273
  14. 274

    UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data حسب Behrouz Ahadzadeh (19757022)

    منشور في 2024
    "…To overcome these challenges, a new FS algorithm named Uniform-solution-driven Binary Feature Selection (UniBFS) has been developed in this study. …"
  15. 275

    Wearable wrist to finger photoplethysmogram translation through restoration using super operational neural networks based 1D-CycleGAN for enhancing cardiovascular monitoring حسب Sakib Mahmud (15302404)

    منشور في 2024
    "…TTR-GAN comprises cascaded dual-stage 1D Cycle Generative Adversarial Networks (1D-CycleGANs) constructed using Super-ONNs. In the first phase, corrupted wPPG waveforms are blindly restored using a 1D-CycleGAN-based restoration framework. …"
  16. 276

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models حسب Osama Bassam J. Rabie (21323741)

    منشور في 2024
    "…Moreover, the DBRF classification model is deployed to categorize the normal and attacking data flows using optimized features. Here, the proposed DRF-DBRF security model's performance is validated and tested using five different and popular IoT benchmarking datasets. …"
  17. 277

    LaScaDa: A Novel Scalable Topology for Data Center Network حسب Zina Chkirbene (16869987)

    منشور في 2020
    "…LaScaDa forwards packets between nodes using a new hierarchical row-based routing algorithm. …"
  18. 278

    Heat rate curve approximation for power plants without data measuring devices حسب Poullikkas, Andreas

    منشور في 2012
    "…The method is applied on a given power system, in which we calculate the electricity cost using the CAPSE (computer aided power economics) algorithm. …"
    احصل على النص الكامل
    article
  19. 279

    RHEEMix in the data jungle: a cost-based optimizer for cross-platform systems. حسب Sebastian Kruse (18595195)

    منشور في 2020
    "…Our main contributions are: (i) a mechanism based on graph transformations to explore alternative execution strategies; (ii) a novel graph-based approach to determine efficient data movement plans among subtasks and platforms; and (iii) an efficient plan enumeration algorithm, based on a novel enumeration algebra. …"
  20. 280

    Application of Machine Learning Algorithms to Enhance Money Laundering and Financial Crime Detection حسب HAMDALLAH, KHALID WAJIH TURKI

    منشور في 2011
    "…In order to analyze the performance of machine learning algorithms, data was provided by a bank to be used for educational purposes and shall remain undisclosed. …"
    احصل على النص الكامل