Search alternatives:
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
-
201
A Modular Reconfigurable Architecture for Asymmetric and Symmetric-key Cryptographic Algorithms
Published 2007“…High throughput and low-cost implementation of these algorithms is critical for achieving both high security and high-speed processing in an increasingly digital global economy. …”
Get full text
masterThesis -
202
An image processing and genetic algorithm-based approach for the detection of melanoma in patients
Published 2018“…The second phase classifies lesions using a Genetic Algorithm. Our technique shows a significant improvement over other well-known algorithms and proves to be more stable on both training and testing data.…”
Get full text
Get full text
Get full text
Get full text
article -
203
Enhanced PSO-Based NN for Failures Detection in Uncertain Wind Energy Systems
Published 2023“…First, a feature selection tool using PSO Algorithm is developed. Then, in order to maximize the diversity between data samples and improve the effectiveness of using PSO algorithm for feature selection, the Euclidean distance metric is used in order to reduce the data and maximize the diversity between data samples. …”
-
204
An ant colony optimization algorithm to improve software quality prediction models
Published 2011“…We use an ant colony optimization algorithm in the adaptation process. …”
Get full text
Get full text
Get full text
article -
205
Multi-marker-LD based genetic algorithm for tag SNP selection
Published 2014“…The performance of the three algorithms are compared with those of a recognized tag SNP selection algorithm using three different real data sets from the HapMap project. …”
Get full text
Get full text
Get full text
article -
206
A Recommended Replacement Algorithm for the Scalable Asynchronous Cache Consistency Scheme
Published 2018Get full text
Get full text
Get full text
Get full text
conferenceObject -
207
Convergence and steady-state analysis of the normalized least mean fourth algorithm
Published 2007“…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …”
article -
208
Convergence and steady-state analysis of the normalized least mean fourth algorithm
Published 2007“…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …”
Get full text
article -
209
-
210
A Genetic Algorithm for Improving Accuracy of Software Quality Predictive Models
Published 2010“…In this work, we present a genetic algorithm to optimize predictive models used to estimate software quality characteristics. …”
Get full text
Get full text
Get full text
article -
211
Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms
Published 2022“…The outcomes revealed that these ML algorithms can be useful in predicting ground losses during wild blueberry harvesting in the selected fields.…”
-
212
UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices
Published 2019“…Then, we develop an effective sub-optimal algorithm based on successive convex approximation in order to obtain results for larger network scenarios. …”
Get full text
Get full text
Get full text
Get full text
article -
213
-
214
-
215
XBeGene: Scalable XML Documents Generator by Example Based on Real Data
Published 2012“…In this paper, we develop a novel XML By example Generator (XBeGene) for producing synthetic XML data which closely reflect the user's requirements. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
216
The application of control algorithm for optimal performance of evaporatively-cooled façade system in hot dry and humid weathers
Published 2021“…An evaporatively-cooled façade system, composed of a Photovoltaic thermal (PVT), evaporative cooler, and evaporatively-cooled façade, was previously developed. In this study, a control algorithm for the system parameters is implemented and applied on spaces with evaporatively-cooled façade to generate the least possible façade temperature, and consequently maximum possible energy savings. …”
Get full text
Get full text
Get full text
article -
217
Extended Behavioral Modeling of FET and Lattice-Mismatched HEMT Devices
Published 2016Get full text
doctoralThesis -
218
Wearable wrist to finger photoplethysmogram translation through restoration using super operational neural networks based 1D-CycleGAN for enhancing cardiovascular monitoring
Published 2024“…TTR-GAN comprises cascaded dual-stage 1D Cycle Generative Adversarial Networks (1D-CycleGANs) constructed using Super-ONNs. In the first phase, corrupted wPPG waveforms are blindly restored using a 1D-CycleGAN-based restoration framework. …”
-
219
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…Moreover, the DBRF classification model is deployed to categorize the normal and attacking data flows using optimized features. Here, the proposed DRF-DBRF security model's performance is validated and tested using five different and popular IoT benchmarking datasets. …”
-
220
LaScaDa: A Novel Scalable Topology for Data Center Network
Published 2020“…LaScaDa forwards packets between nodes using a new hierarchical row-based routing algorithm. …”