Search alternatives:
element control » tolerant control (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element control » tolerant control (Expand Search)
using algorithm » cosine algorithm (Expand Search)
-
61
-
62
-
63
Genetic and heuristic algorithms for regrouping service sites. (c2000)
Published 2000Get full text
Get full text
masterThesis -
64
A Survey of Data Clustering Techniques
Published 2023“…Clustering, an unsupervised learning technique, aims to identify a specific number of clusters to effectively categorize the data through data grouping. Hence, clustering is related to many fields and is used in various applications that deal with large datasets. …”
Get full text
Get full text
Get full text
masterThesis -
65
-
66
Clustering/partitioning algorithms and comparative analysis
Published 1989Get full text
Get full text
masterThesis -
67
Segmenting Handwritten Arabic Text
Published 2002“…In this work a technique is presented that segments difficult handwritten Arabic text. A conventional algorithm is used for the initial segmentation of the text into connected blocks of characters. …”
Get full text
Get full text
Get full text
article -
68
-
69
A multi-class discriminative motif finding algorithm for autosomal genomic data. (c2015)
Published 2016“…New technologies, such as Next-Generation Genome Sequencing, can now provide huge amounts of data in little time. Big initiatives such as the International Hapmap Project and the 1000 Genome project are making use of these technologies to provide the scientific community with a detailed genetic reference from different populations. …”
Get full text
Get full text
masterThesis -
70
-
71
-
72
Capturing outline of fonts using genetic algorithm and splines
Published 2001“…Some examples are given to show the results obtained from the algorithm…”
Get full text
Get full text
article -
73
-
74
A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining
Published 2021“…Third, a text mining algorithm has been implemented. Fourth, the systematic approach has been modeled using business process modeling notation. …”
-
75
Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation
Published 2022“…We describe our differentially-private model with flexible constraints and a dynamic window algorithm to maintain the privacy-budget loss in infinitely generated time-series data. …”
-
76
A Novel Big Data Classification Technique for Healthcare Application Using Support Vector Machine, Random Forest and J48
Published 2022“…The performance of the algorithms for accuracy was evaluated using the Healthcare (heart attack possibility) dataset, freely available on kagle. …”
Get full text
-
77
Revolutionizing sustainable supply chain management: A review of metaheuristics
Published 2023“…The paper also identifies the key factors that influence the success of using metaheuristics for SSCM, such as the choice of algorithm, problem complexity, and data quality. …”
Get full text
-
78
A method for data path synthesis using neural networks
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
79
-
80
Using genetic algorithms to optimize software quality estimation models
Published 2004“…In the first approach, we assume the existence of several models, and we use a genetic algorithm to combine them, and adapt them to a given data set. …”
Get full text
Get full text
Get full text
masterThesis