Search alternatives:
using algorithm » cosine algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search)
element » elements (Expand Search)
colony » colon (Expand Search)
using algorithm » cosine algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search)
element » elements (Expand Search)
colony » colon (Expand Search)
-
41
General applicability of genetic and simulated annealing algorithms for data mapping
Published 1995Get full text
Get full text
Get full text
conferenceObject -
42
A Genetic Algorithm for Improving Accuracy of Software Quality Predictive Models
Published 2010“…In this work, we present a genetic algorithm to optimize predictive models used to estimate software quality characteristics. …”
Get full text
Get full text
Get full text
article -
43
-
44
-
45
-
46
A comparison of data mapping algorithms for parallel iterative PDE solvers
Published 1995“…We review and evaluate the performances of six data mapping algorithms used for parallel single-phase iterative PDE solvers with irregular 2-dimensional meshes on multicomputers. …”
Get full text
Get full text
Get full text
article -
47
An enhanced k-means clustering algorithm for pattern discovery in healthcare data
Published 2015“…This paper studies data mining applications in healthcare. Mainly, we study k-means clustering algorithms on large datasets and present an enhancement to k-means clustering, which requires k or a lesser number of passes to a dataset. …”
Get full text
Get full text
Get full text
Get full text
article -
48
Efficient Dynamic Cost Scheduling Algorithm for Financial Data Supply Chain
Published 2021“…The primary tool used in the data supply chain is data batch processing which requires efficient scheduling. …”
Get full text
article -
49
DG-Means – A Superior Greedy Algorithm for Clustering Distributed Data
Published 2022“…In this work, we present DG-means, which is a greedy algorithm that performs on distributed sets of data. …”
Get full text
Get full text
Get full text
masterThesis -
50
-
51
-
52
-
53
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
Published 2022“…<p>Communication has become a lot easier in this era of technology, development of high-speed computer networks, and the inexpensive uses of Internet. Therefore, data transmission has become vulnerable to and unsafe from different external attacks. …”
-
54
-
55
Genetic and heuristic algorithms for regrouping service sites. (c2000)
Published 2000Get full text
Get full text
masterThesis -
56
Joint energy-distortion aware algorithms for cooperative video streaming over LTE networks
Published 2013“…In the proposed approach, mobiles are grouped into collaborative clusters using a low-complexity clustering algorithm. In each cluster, collaboration is implemented by having a cluster head send the content to other cluster members using a short-range wireless communications technology. …”
Get full text
Get full text
Get full text
article -
57
A Survey of Data Clustering Techniques
Published 2023“…Clustering, an unsupervised learning technique, aims to identify a specific number of clusters to effectively categorize the data through data grouping. Hence, clustering is related to many fields and is used in various applications that deal with large datasets. …”
Get full text
Get full text
Get full text
masterThesis -
58
-
59
Clustering/partitioning algorithms and comparative analysis
Published 1989Get full text
Get full text
masterThesis -
60