Search alternatives:
method algorithm » mould algorithm (Expand Search)
taking algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
method algorithm » mould algorithm (Expand Search)
taking algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
-
61
Social spider optimization algorithm: survey and new applications
Published 2024“…This survey also studied the main applications of this algorithm in different fields, including medical, mathematical, artificial intelligence, engineering, and data engineering, and how this algorithm affected, impacted, and supported the different fields. …”
Get full text
-
62
Application of Data Mining to Predict and Diagnose Diabetic Retinopathy
Published 2024Get full text
doctoralThesis -
63
An improved quorum selection algorithm (IQSA). (c2007)
Published 2007Get full text
Get full text
masterThesis -
64
A hybrid graph representation for exact graph algorithms
Published 2014“…We investigate practical implementation-based aspects of exact graph algorithms by providing a simple hybrid graph representation that trades space for time to address the said take-back challenge. …”
Get full text
Get full text
Get full text
conferenceObject -
65
A hybrid graph representation for recursive backtracking algorithms
Published 2017“…The use of efficient data structures is necessary for fast graph modification modules as well as fast take-back procedures. In this paper, we investigate practical implementation-based aspects of exact algorithms by providing a hybrid graph representation that addresses the take-back challenge and combines the advantage of O(1)O(1) adjacency-queries in adjacency-matrices with the advantage of efficient neighborhood traversal in adjacency-lists.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
66
(k, l)-Clustering for Transactional Data Streams Anonymization
Published 2018Get full text
Get full text
Get full text
Get full text
conferenceObject -
67
Mining airline data for CRM strategies. (c2006)
Published 2006Get full text
Get full text
masterThesis -
68
Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements
Published 2023“…<p dir="ltr">This work proposes an original preconditioner that couples the Constrained Pressure Residual (CPR) method with block preconditioning for the efficient solution of the linearized systems of equations arising from fully implicit multiphase flow models. …”
-
69
Exploring Semi-Supervised Learning Algorithms for Camera Trap Images
Published 2022Get full text
doctoralThesis -
70
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006“…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …”
Get full text
Get full text
article -
71
Eye-Clustering: An Enhanced Centroids Prediction for K-means Algorithm
Published 2024“…Various clustering methods are available, including K-means, hierarchical clustering, and density-based clustering. …”
Get full text
Get full text
Get full text
masterThesis -
72
Interval-Valued SVM Based ABO for Fault Detection and Diagnosis of Wind Energy Conversion Systems
Published 2022“…The proposals will enhance the monitoring and diagnosis of the WEC system while taking into account the system uncertainties. The developed techniques are based on Support Vector Machine (SVM) model to improve the diagnosis of WEC systems. …”
-
73
Using genetic algorithms to optimize software quality estimation models
Published 2004Get full text
Get full text
Get full text
masterThesis -
74
Simulated annealing and genetic algorithms for exam scheduling. (c1997)
Published 1997Get full text
Get full text
masterThesis -
75
Bee colony algorithm for assigning proctors to exams. (c2013)
Published 2013Get full text
Get full text
masterThesis -
76
A Scatter search algorithm for exam scheduling. (c2006)
Published 2006Get full text
Get full text
masterThesis -
77
Second-order conic programming for data envelopment analysis models
Published 2022“…Data envelopment analysis (DEA) is a widely used benchmarking technique. …”
Get full text
Get full text
-
78
Data mining approach to predict student's selection of program majors
Published 2019“…The approach includes a methodology to manage data mining projects, sampling techniques to handle imbalanced data and multiclass data, a set of classification algorithms to predict and measures to evaluate performance of models. …”
Get full text
-
79
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …”
Get full text
-
80
A method for optimizing test bus assignment and sizing for system-on-a-chip
Published 2017“…Test access mechanism (TAM) is an important element of test access architectures for embedded cores and is responsible for on-chip test patterns transport from the source to the core under test to the sink. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject