Search alternatives:
custom algorithm » control algorithm (Expand Search), auction algorithm (Expand Search), cosine algorithm (Expand Search)
making algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data making » data mining (Expand Search)
custom algorithm » control algorithm (Expand Search), auction algorithm (Expand Search), cosine algorithm (Expand Search)
making algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data making » data mining (Expand Search)
-
161
Development of an Optimization Scheme for A Fixed-Wing UAV Long Endurance with PEMFC and Battery
Published 2018Get full text
doctoralThesis -
162
Meta-Heuristic Procedures for the Multi-Resource Leveling Problem with Activity Splitting
Published 2011Get full text
doctoralThesis -
163
Improved Dwarf Mongoose Optimization for Constrained Engineering Design Problems
Published 2022“…The performance of the IDMO, using different performance metrics and statistical analysis, is compared with the DMO and eight other existing algorithms. …”
Get full text
-
164
Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE
Published 2020“…The data has not been investigated to the extent that such analysis can support decision-making or revenue/budget forecasting. …”
Get full text
-
165
An easy-to-use scalable framework for parallel recursive backtracking
Published 2013“…Solving NP-hard graph problems to optimality using exact algorithms is an example of an area in which there has so far been limited success in obtaining large scale parallelism. …”
Get full text
Get full text
Get full text
article -
166
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
Published 2022“…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …”
-
167
Using machine learning for disease detection. (c2013)
Published 2016Get full text
Get full text
masterThesis -
168
Simple and effective neural-free soft-cluster embeddings for item cold-start recommendations
Published 2022“…Our experimental results on four benchmark datasets conclusively demonstrate that the proposed algorithm makes accurate recommendations in item cold-start settings compared to the state-of-the-art algorithms according to commonly used ranking metrics like Normalized Discounted Cumulative Gain (NDCG) and Mean Average Precision (MAP). …”
-
169
-
170
-
171
Information warfare recovery-fighting back through the matrix. (c2012)
Published 2012Get full text
Get full text
masterThesis -
172
Assigning proctors to exams using scatter search. (c2006)
Published 2006Get full text
Get full text
masterThesis -
173
-
174
A method for data path synthesis using neural networks
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
175
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
Published 2020“…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …”
-
176
A combined resource allocation framework for PEVs charging stations, renewable energy resources and distributed energy storage systems
Published 2017“…The formulation is decomposed into two interdependent sub-problems and solved using a combination of metaheuristic and deterministic optimization techniques. …”
Get full text
article -
177
Accommodating High Penetrations of Renewable Distributed Generation Mix in Smart Grids
Published 2017Get full text
doctoralThesis -
178
Defining quantitative rules for identifying influential researchers: Insights from mathematics domain
Published 2024“…These rules are based on measurable quantities that can easily be applied to a researcher's quantitative data. Various search engines, like Google Scholar, Semantic Scholar, Web of Science etc. …”
-
179
Boosting the visibility of services in microservice architecture
Published 2023“…In this research, we evaluate the performance of several classification algorithms for estimating the quality of microservices using the QWS dataset containing traffic data of 2505 microservices. …”
-
180
Nonlinear analysis of shell structures using image processing and machine learning
Published 2023“…<p dir="ltr">In this paper, we propose a novel approach to solve nonlinear stress analysis problems in shell structures using an image processing technique. …”