Search alternatives:
using algorithm » cosine algorithm (Expand Search)
box algorithm » rd algorithm (Expand Search)
elements box » elements _ (Expand Search)
using algorithm » cosine algorithm (Expand Search)
box algorithm » rd algorithm (Expand Search)
elements box » elements _ (Expand Search)
-
201
A FAMILY OF NORMALIZED LEAST MEAN FOURTH ALGORITHMS
Published 2020“…In this work, a family of normalized least mean fourth algorithms is presented. Unlike the LMF algorithm, the convergence behavior of these algorithms is independent of the input data correlation statistics. …”
Get full text
article -
202
A hybrid graph representation for recursive backtracking algorithms
Published 2017“…The use of efficient data structures is necessary for fast graph modification modules as well as fast take-back procedures. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
203
Social spider optimization algorithm: survey and new applications
Published 2024“…This survey also studied the main applications of this algorithm in different fields, including medical, mathematical, artificial intelligence, engineering, and data engineering, and how this algorithm affected, impacted, and supported the different fields. …”
Get full text
-
204
Application of Data Mining to Predict and Diagnose Diabetic Retinopathy
Published 2024Get full text
doctoralThesis -
205
Global smart cities classification using a machine learning approach to evaluating livability, technology, and sustainability performance across key urban indices
Published 2025“…Drawing on data from the Smart Cities Index (SCI) and other economic and sustainability competitiveness metrics, the study uses various <u>ML algorithms</u> to categorize cities into <u>performance classes</u>, ranging from high-achieving Class 1 to emerging Class 3 cities. …”
-
206
IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture
Published 2025“…The IoMT manufacturers need to offer their products at a competitive price, which forces them to use simplified architecture, leaving limited and, to some extent, no scope to employ sophisticated cybersecurity algorithms. …”
-
207
A comparison of optimization heuristics for the data mapping problem
Published 1997“…In this paper we compare the performance of six heuristics with suboptimal solutions for the data mapping problem of two dimensional meshes that are used for the numerical solution of Partial Differential Equations(PDEs) on multicomputers. …”
Get full text
Get full text
Get full text
article -
208
Data redundancy management for leaf-edges in connected environments
Published 2022“…Although the sensed data could be useful for various applications (e.g., event detection in cities, energy management in commercial buildings), it first requires pre-processing to clean various inconsistencies (e.g., anomalies, redundancies, missing values). …”
Get full text
Get full text
Get full text
Get full text
article -
209
Exploring Semi-Supervised Learning Algorithms for Camera Trap Images
Published 2022Get full text
doctoralThesis -
210
Time-varying volatility model equipped with regime switching factor: valuation of option price written on energy futures
Published 2025“…To determine the parameters of the regime switching model and identify when economic states change, we employ the EM algorithm, utilizing real gas futures price data. We validate our closed-form solution for the option pricing through simulations employing the generalized antithetic variates Monte-Carlo technique. …”
Get full text
article -
211
A fast exact sequential algorithm for the partial digest problem
Published 2016“…Two types of simulated data, random and Zhang, are used to measure the efficiency of the algorithm. …”
-
212
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006“…The algorithm is tested using 200 randomly generated 2-variable 4-valued functions. …”
Get full text
Get full text
article -
213
Simulated annealing and genetic algorithms for exam scheduling. (c1997)
Published 1997Get full text
Get full text
masterThesis -
214
Big Data Energy Management, Analytics and Visualization for Residential Areas
Published 2020“…A high-speed distributed computing cluster based on commodity hardware with efficient big data mathematical algorithm is employed in this work. …”
Get full text
article -
215
Second-order conic programming for data envelopment analysis models
Published 2022“…Data envelopment analysis (DEA) is a widely used benchmarking technique. …”
Get full text
Get full text
-
216
Data mining approach to predict student's selection of program majors
Published 2019“…The approach includes a methodology to manage data mining projects, sampling techniques to handle imbalanced data and multiclass data, a set of classification algorithms to predict and measures to evaluate performance of models. …”
Get full text
-
217
Enhanced climate change resilience on wheat anther morphology using optimized deep learning techniques
Published 2024“…The DinoLite Microscope’s high-resolution images are used to measure the length and width of wheat anthers. …”
-
218
A hybrid heuristic approach to optimize rule based software quality estimation models. (c2008)
Published 2008Get full text
Get full text
masterThesis -
219
An image processing and genetic algorithm-based approach for the detection of melanoma in patients
Published 2018“…The second phase classifies lesions using a Genetic Algorithm. Our technique shows a significant improvement over other well-known algorithms and proves to be more stable on both training and testing data.…”
Get full text
Get full text
Get full text
Get full text
article -
220
An ant colony optimization algorithm to improve software quality prediction models
Published 2011“…We use an ant colony optimization algorithm in the adaptation process. …”
Get full text
Get full text
Get full text
article