Search alternatives:
codingnb algorithm » cosine algorithm (Expand Search)
means algorithm » search algorithm (Expand Search)
cnn algorithm » rd algorithm (Expand Search), colony algorithm (Expand Search), cosine algorithm (Expand Search)
element » elements (Expand Search)
codingnb algorithm » cosine algorithm (Expand Search)
means algorithm » search algorithm (Expand Search)
cnn algorithm » rd algorithm (Expand Search), colony algorithm (Expand Search), cosine algorithm (Expand Search)
element » elements (Expand Search)
-
1
An Efficient Tabu Search Algorithm For The Single-Machine Mean Tardiness Problem
Published 2020“…In this paper, an efficient tabu search algorithm is prepared ibr solving the singlemachine mean tardiness problem. …”
Get full text
article -
2
Simulated tempering and mean field annealing for mapping to multicomputers. (c1996)
Published 1996Get full text
Get full text
masterThesis -
3
Adaptive step-size sign least mean squares
Published 2004“…It is shown how the algorithm can be implemented with no real multiplication. …”
Get full text
Get full text
article -
4
-
5
Enhancing Breast Cancer Diagnosis With Bidirectional Recurrent Neural Networks: A Novel Approach for Histopathological Image Multi-Classification
Published 2025“…The BRNN model, refined using the Adagrad optimization algorithm, efficiently integrates the learned features from both branches. …”
-
6
Real-Time Implementation of GPS Aided Low Cost Strapdown Inertial Navigation System
Published 2009Get full text
doctoralThesis -
7
Optimized FPGA Implementation of PWAM-Based Control of Three—Phase Nine—Level Quasi Impedance Source Inverter
Published 2019“…Since, PWAM control algorithm is more complex than PSCPWM, FPGA based implementation for PWAM control is discussed. …”
-
8
New Hardware Algorithms and Designs for Montgomery Modular Inverse Computation in Galois Fields GF(p) and GF(2n)
Published 2002“…We suggest a new correction phase for a previously proposed almost Montgomery inverse algorithm to calculate the inversion in hardware. It is also presented how to obtain a fast hardware algorithm to compute the inverse by multi-bit shifting method. …”
Get full text
Get full text
masterThesis -
9
Boosting the visibility of services in microservice architecture
Published 2023“…Our research also analyzed the boosting algorithms, namely Gradient Boost, XGBoost, LightGBM, and CatBoost to improve the overall performance. …”
-
10
Day-Ahead Load Demand Forecasting in Urban Community Cluster Microgrids Using Machine Learning Methods
Published 2022“…Thus, to identify the best load forecasting method in cluster microgrids, this article implements a variety of machine learning algorithms, including linear regression (quadratic), support vector machines, long short-term memory, and artificial neural networks (ANN) to forecast the load demand in the short term. …”
-
11
Design and simulation of superdirective adaptive antenna arrays
Published 1990“…The commonly used adaptive algorithms were compared and the LMS (least mean square) algorithm was selected for the simulation of the adaptive array system. …”
Get full text
Get full text
article -
12
Blue collar laborers’ travel pattern recognition: Machine learning classifier approach
Published 2021“…A bagged Clustering algorithm was employed to identify the number of clusters, then the C-Means algorithm and the Pamk algorithm were implemented to validate the results. …”
-
13
Tailoring motivational health messages for smoking cessation using an mHealth recommender system integrated with an electronic health record: a study protocol
Published 2018“…Technology can provide convenient means to deliver tailored health messages. Health recommender systems are information-filtering algorithms that can choose the most relevant health-related items—for instance, motivational messages aimed at smoking cessation—for each user based on his or her profile. …”
-
14
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
Published 2019“…Despite having different performance results on predicting failures, most of the models produced close outcomes. Meaning no “perfect” machine learning algorithm that will produce good results at particular problem, in fact for each type of problem a specific algorithm is suited and might achieves good outcome, while another algorithm fails heavily. …”
Get full text
-
15
Supervised term-category feature weighting for improved text classification
Published 2022“…It requires appropriate features to describe the contents and meaning of text documents, and map them with their target categories. …”
Get full text
Get full text
Get full text
Get full text
article -
16
Using artificial bee colony to optimize software quality estimation models. (c2015)
Published 2016“…In order to measure such software quality characteristics, we must wait until the software is implemented, tested and put to use for a certain amount of time. …”
Get full text
Get full text
masterThesis -
17
Cross entropy error function in neural networks
Published 2002“…This paper applies artificial neural networks to forecast gasoline consumption. The ANN is implemented using the cross entropy error function in the training stage. …”
Get full text
Get full text
Get full text
conferenceObject -
18
A machine learning approach for localization in cellular environments
Published 2018“…This constitutes an improvement of 41%, 45%, and 16%, respectively, over the WKNN-only algorithm.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
19
Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks
Published 2022“…This study proposes an analytical method based on sequential quadratic programming (SQP) methodology coupled with a mean value analysis (MVA) algorithm to solve this NP-Hard problem. …”
-
20
Towards secure and trusted AI in healthcare: A systematic review of emerging innovations and ethical challenges
Published 2025“…It made it possible for healthcare professionals to understand AI-driven recommendations, by this means increasing transparency and trust. Still, challenges in adversarial attacks, algorithmic bias, and variable regulatory frameworks remain strong. …”