Search alternatives:
using algorithm » cosine algorithm (Expand Search)
per algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
elements per » elementi per (Expand Search), elements _ (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
per algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
elements per » elementi per (Expand Search), elements _ (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
-
281
Multi-marker-LD based genetic algorithm for tag SNP selection
Published 2014“…The performance of the three algorithms are compared with those of a recognized tag SNP selection algorithm using three different real data sets from the HapMap project. …”
Get full text
Get full text
Get full text
article -
282
A Survey of Machine Learning Innovations in Ambulance Services: Allocation, Routing, and Demand Estimation
Published 2024“…ML algorithms could play a pivotal role in dynamically allocating resources, devising efficient routes, and predicting demand patterns. …”
-
283
A Recommended Replacement Algorithm for the Scalable Asynchronous Cache Consistency Scheme
Published 2018Get full text
Get full text
Get full text
Get full text
conferenceObject -
284
-
285
Convergence and steady-state analysis of the normalized least mean fourth algorithm
Published 2007“…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …”
article -
286
Convergence and steady-state analysis of the normalized least mean fourth algorithm
Published 2007“…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …”
Get full text
article -
287
-
288
Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms
Published 2022“…The outcomes revealed that these ML algorithms can be useful in predicting ground losses during wild blueberry harvesting in the selected fields.…”
-
289
-
290
-
291
A heuristics for HTTP traffic identification in measuring user dissimilarity
Published 2020“…The study utilizes HTTP request method of GET filtering, to develop a heuristic algorithm to identify user-initiated requests. …”
-
292
UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices
Published 2019“…The global evolution of wireless technologies and intelligent sensing devices are transforming the realization of smart cities. Among the myriad of use cases, there is a need to support applications whereby low-resource Internet of Things (IoT) devices need to upload their sensor data to a remote control centre by target hard deadlines; otherwise, the data becomes outdated and loses its value, for example, in emergency or industrial control scenarios. …”
Get full text
Get full text
Get full text
Get full text
article -
293
The application of control algorithm for optimal performance of evaporatively-cooled façade system in hot dry and humid weathers
Published 2021“…An evaporatively-cooled façade system, composed of a Photovoltaic thermal (PVT), evaporative cooler, and evaporatively-cooled façade, was previously developed. …”
Get full text
Get full text
Get full text
article -
294
-
295
Trajectory Planning and Resource Allocation of Multiple UAVs for Data Delivery in Vehicular Networks
Published 2019“…To solve it, we employ a sequence of convex approximates. Then, we develop an efficient algorithm to sequentially solve this problem. …”
Get full text
Get full text
Get full text
Get full text
article -
296
XBeGene: Scalable XML Documents Generator by Example Based on Real Data
Published 2012“…In this paper, we develop a novel XML By example Generator (XBeGene) for producing synthetic XML data which closely reflect the user's requirements. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
297
Wearable wrist to finger photoplethysmogram translation through restoration using super operational neural networks based 1D-CycleGAN for enhancing cardiovascular monitoring
Published 2024“…TTR-GAN comprises cascaded dual-stage 1D Cycle Generative Adversarial Networks (1D-CycleGANs) constructed using Super-ONNs. In the first phase, corrupted wPPG waveforms are blindly restored using a 1D-CycleGAN-based restoration framework. …”
-
298
-
299
LaScaDa: A Novel Scalable Topology for Data Center Network
Published 2020“…LaScaDa forwards packets between nodes using a new hierarchical row-based routing algorithm. …”
-
300
Heat rate curve approximation for power plants without data measuring devices
Published 2012“…The method is applied on a given power system, in which we calculate the electricity cost using the CAPSE (computer aided power economics) algorithm. …”
Get full text
article