Search alternatives:
method algorithm » mould algorithm (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
method algorithm » mould algorithm (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
-
541
-
542
-
543
Test time minimization for system-on-chip with test bus assignment and sizin
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
544
(k, l)-Clustering for Transactional Data Streams Anonymization
Published 2018Get full text
Get full text
Get full text
Get full text
conferenceObject -
545
Generic metadata representation framework for social-based event detection, description, and linkage
Published 2020“…SEDDaL consists of four main modules for: i) describing social media objects in a generic Metadata Representation Space Model (MRSM) consisting of three composite dimensions: temporal, spatial, and semantic, ii) evaluating the similarity between social media objects’ descriptions following MRSM, iii) detecting events from similar social media objects using an adapted unsupervised learning algorithm, where events are represented as clusters of objects in MRSM, and iv) identifying directional, metric, and topological relationships between events following MRSM’s dimensions. …”
Get full text
Get full text
Get full text
Get full text
article -
546
The effects of data balancing approaches: A case study
Published 2023“…<p dir="ltr">Imbalanced datasets affect the performance of machine learning algorithms adversely. To cope with this problem, several resampling methods have been developed recently. …”
-
547
-
548
VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems
Published 2019“…However, NNGE algorithm tends to produce rules that test a large number of input features. …”
-
549
Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks
Published 2023“…The simulation results show that the proposed algorithm outperforms the above-mentioned reference algorithms in all evaluation metrics and is proved to be comparable to the optimal solution given its low complexity.…”
-
550
Development of Modular DC-DC Converters for Low-Speed Electric Vehicles Fast Chargers
Published 2021“…The controller is examined using a 3-module ISOP DC-DC converter, where the controlled current is following the reflex charging algorithm. …”
-
551
Approximate XML structure validation technical report
Published 2014“…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…”
Get full text
Get full text
Get full text
article -
552
Modular-width
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
553
A MIMO Sampling-Rate-Dependent Controller
Published 2014“…A sampling-rate-dependent (SRD) controller is proposed for the uniform output tracking problem of multiinput multioutput discrete time-varying linear systems. …”
Get full text
Get full text
Get full text
Get full text
article -
554
Impacts of On-Grid Solar PV on Distribution Networks and Potential Solutions: A Case Study in the Region of Zahle
Published 2025“…Afterward, the optimal siting and sizing of capacitor banks (CBs) are performed on the modeled network to alleviate the impacts of the PV DGs using both MATLAB and OpenDSS. The siting and sizing methodology is conducted by considering five different optimization algorithms, namely the single-objective genetic algorithm (SOGA), the combined SOGA and loss sensitivity factor algorithm (SOGA-LSF), the multi-objective genetic algorithm (MOGA), the combined MOGA-LSF and the CAPADD algorithm of OpenDSS. …”
Get full text
Get full text
Get full text
masterThesis -
555
Improving the security of SNMP in wireless networks
Published 2017“…We propose to use certification authority for two-way authentication and Diffie-Hellman algorithm for key exchange to mitigate the impacts of these problems.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
556
Net energy–cost optimization of STPV–PDRC integrated greenhouses: Balancing energy production and cooling demand under crop-specific DLI constraints
Published 2025“…An improved equilibrium optimizer (IEO) algorithm was employed to solve the multi-objective problem. …”
-
557
Evolutionary support vector regression for monitoring Poisson profiles
Published 2023“…This paper aims to monitor Poisson profile monitoring problem in Phase II and develops a new robust control chart using support vector regression by incorporating some novel input features and evolutionary training algorithm. …”
-
558
A Dual Vibration Absorber for Vibration Suppression of Harmonically Forced Systems
Published 2022“…Then, a numerical technique based on both the genetic algorithm and the search simplex method is used to calculate the optimal system parameters. …”
Get full text
Get full text
Get full text
masterThesis -
559
LDSVM: Leukemia Cancer Classification Using Machine Learning
Published 2022“…Currently, it is difficult to classify cancers using microarray data. Nearly many data mining techniques have failed because of the small sample size, which has become more critical for organizations. …”
-
560
Implementation of trust region methods in optimization. (c1998)
Published 1998Get full text
Get full text
masterThesis