Search alternatives:
encoding algorithm » cosine algorithm (Expand Search)
deer algorithm » search algorithm (Expand Search)
element deer » elementi per (Expand Search)
data fitting » data mining (Expand Search), data hiding (Expand Search)
encoding algorithm » cosine algorithm (Expand Search)
deer algorithm » search algorithm (Expand Search)
element deer » elementi per (Expand Search)
data fitting » data mining (Expand Search), data hiding (Expand Search)
-
1
Efficient Approximate Conformance Checking Using Trie Data Structures
Published 2021Subjects: “…Estimation error,Runtime,Computational modeling,Data structures,Approximation algorithms,Encoding,Computational efficiency…”
Get full text
Get full text
Get full text
-
2
-
3
The unified effect of data encoding, ansatz expressibility and entanglement on the trainability of HQNNs
Published 2023“…We focus on the combined influence of data encoding, qubit entanglement, and ansatz expressibility in hybrid quantum neural networks (HQNNs) for multi-class classification tasks. …”
-
4
Genetic and heuristic algorithms for regrouping service sites. (c2000)
Published 2000Get full text
Get full text
masterThesis -
5
-
6
A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks
Published 2022“…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …”
-
7
A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems
Published 2025“…<p dir="ltr">Federated Learning (FL) is gaining traction in Android-based consumer electronics, enabling collaborative model training across decentralized devices while preserving data privacy. However, the increasing adoption of FL in these devices exposes them to adversarial attacks that can compromise user data and device security. …”
-
8
Bee Colony Algorithm for Proctors Assignment.
Published 2015“…The search accomplished by three types of bees over a number of iterations aiming to find the source with the highest nectar value (fitness value of a candidate solution). We apply the Bee Colony algorithm to previously published data. …”
Get full text
Get full text
Get full text
article -
9
Particle swarm optimization algorithm: review and applications
Published 2024“…This paper surveys the published papers in PSO algorithms. Twenty research papers are analyzed and classified according to the implementation area used by the PSO algorithm (neural networks, feature selection, and data clustering). …”
Get full text
-
10
Capturing outline of fonts using genetic algorithm and splines
Published 2001“…We present a method to convert the original problem into a discrete combinatorial optimization problem and solve it by a genetic algorithm. We also incorporate a corner detection algorithm to detect significant points which are necessary to capture a pleasant looking spline fitting for shapes such as fonts. …”
Get full text
Get full text
article -
11
Social spider optimization algorithm: survey and new applications
Published 2024“…Each spider has a weight based on the value of fitness. This algorithm consists of two search spiders called agents: males and females. …”
Get full text
-
12
A Scatter search algorithm for exam scheduling. (c2006)
Published 2006Get full text
Get full text
masterThesis -
13
BioNetApp: An interactive visual data analysis platform for molecular expressions
Published 2019“…BioNetApp also provides data clustering based on molecular concentrations using Self Organizing Maps (SOM), K-Means, K-Medoids, and Farthest First algorithms.…”
-
14
Data-Driven Electricity Demand Modeling for Electric Vehicles Using Machine Learning
Published 2024Get full text
doctoralThesis -
15
-
16
Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm
Published 2022“…The antecedent part parameters (Gaussian membership function parameters) are encoded as a population of artificial swarm of grasshoppers and optimized using its algorithm. …”
-
17
-
18
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Published 2022“…Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …”
-
19
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
Published 2024“…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …”
-
20
Optimization of Commercially Off the Shelf (COTS) Electric Propulsion System for Low Speed Fuel Cell UAV
Published 2013Get full text
doctoralThesis