Search alternatives:
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
mould » could (Expand Search), would (Expand Search), mold (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
mould » could (Expand Search), would (Expand Search), mold (Expand Search)
-
101
Portfolio Selection Problem Using CVaR Risk Measures Equipped with DEA, PSO, and ICA Algorithms
Published 2022“…There are different metrics for the calculation of the risk factor, among which the most important one is the Conditional Value at Risk (CVaR). On the other hand, Data Envelopment Analysis (DEA) can be used to form the optimal portfolio and evaluate its efficiency. …”
-
102
Energy utilization assessment of a semi-closed greenhouse using data-driven model predictive control
Published 2021“…The proposed method consists of a multilayer perceptron model representing the greenhouse system integrated with an objective function and an optimization algorithm. The multilayer perceptron model is trained using historical data from the greenhouse with solar radiation, outside temperature, humidity difference, fan speed, HVAC control as the input parameters to predict the temperature. …”
-
103
A decentralized load balancing strategy for parallel search-three optimization. (c2010)
Published 2010Get full text
Get full text
masterThesis -
104
Calibration of building model based on indoor temperature for overheating assessment using genetic algorithm: Methodology, evaluation criteria, and case study
Published 2022“…It was found that the calibrated model achieved these metrics with RMSE of 0.3 ◦C, and MAD of 0.8 ◦C, and 85% of data points with an error less than 0.5 ◦C for a school building case.…”
Get full text
Get full text
Get full text
-
105
Haplotype inference by pure-parsimony using revamped delayed haplotype selection. (c2011)
Published 2011Get full text
Get full text
masterThesis -
106
Parallel implementation of clique partitioning using artificial neural networks. (c2000)
Published 2000Get full text
Get full text
masterThesis -
107
-
108
-
109
-
110
Using Educational Data Mining Techniques in Predicting Grade-4 students’ performance in TIMSS International Assessments in the UAE
Published 2018“…Classification is a Data Mining (DM) technique used for prediction. On the other hand, feature selection is the process of finding the best set of features that has the most impact on a specific target. …”
Get full text
-
111
-
112
-
113
A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks
Published 2022“…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …”
-
114
Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques
Published 2020“…The obtained results illustrate the efficacy of the proposed algorithm to analyze the time series data from the IoT devices for spam detection.…”
-
115
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Published 2022“…To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …”
-
116
Content-Aware Adaptive Video Streaming Using Actor-Critic Deep Reinforcement Learning
Published 2024Get full text
doctoralThesis -
117
-
118
-
119
BUC algorithm for iceberg cubes
Published 2003“…The Uniform distribution is used as a basis for comparison. Results show that when the cube is sparse there is a correlation between the data distribution and the running time of the algorithm. …”
Get full text
Get full text
Get full text
conferenceObject -
120
An enhanced quorum selection algorithm
Published 2009Get full text
Get full text
Get full text
article