Search alternatives:
method algorithm » mould algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
-
21
-
22
UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data
Published 2024“…UniBFS exploits the inherent characteristic of binary algorithms-binary coding-to search the entire problem space for identifying relevant features while avoiding irrelevant ones. …”
-
23
-
24
Multi-marker-LD based genetic algorithm for tag SNP selection
Published 2014“…The performance of the three algorithms are compared with those of a recognized tag SNP selection algorithm using three different real data sets from the HapMap project. …”
Get full text
Get full text
Get full text
article -
25
A reduced model for phase-change problems with radiation using simplified PN approximations
Published 2025“…The integro-differential equation for the full radiative transfer is replaced by a set of differential equations which are independent of the angle variable and easy to solve using conventional computational methods. To solve the coupled equations, we implement a second-order implicit scheme for the time integration and a mixed finite element method for the space discretization. …”
Get full text
article -
26
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
27
Predicting Patient ICU Readmission Using Recurrent Neural Networks With Long Short-Term Memory
Published 2025Subjects: -
28
Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study
Published 2021“…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …”
Get full text
article -
29
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
Published 2023“…In addition, the proposed encryption algorithm utilizes two different chaotic maps. To ensure the appropriate utilization of these chaotic maps, we carry out in-depth analyses of their behavior in the context of secure communication and apply the pseudo-random sequences of chaotic maps in the proposed image encryption algorithm accordingly.…”
-
30
A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes
Published 2022“…<p>We have proposed a robust, secure and efficient image encryption algorithm based on chaotic maps and algebraic structure. …”
-
31
Design of adaptive arrays based on element position perturbations
Published 1993“…The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …”
Get full text
Get full text
article -
32
A decentralized load balancing strategy for parallel search-three optimization. (c2010)
Published 2010Get full text
Get full text
masterThesis -
33
The Use of Microwave Tomography in Bone Healing Monitoring
Published 2019Get full text
doctoralThesis -
34
Growing hierarchical self-organizing map for filtering intrusion detection alarms
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
35
-
36
Oversampling techniques for imbalanced data in regression
Published 2024“…For such high-dimension data our approach outperforms the Synthetic Minority Oversampling Technique for Regression (SMOTER) algorithm for the IMDB-WIKI and AgeDB image datasets. …”
-
37
Dynamic adaptation for video streaming over mobile devices. (c2013)
Published 2013Get full text
Get full text
masterThesis -
38
-
39
A kernelization algorithm for d-Hitting Set
Published 2010“…For 3-Hitting Set, an arbitrary instance is reduced into an equivalent one that contains at most 5k2+k elements. This kernelization is an improvement over previously known methods that guarantee cubic-order kernels. …”
Get full text
Get full text
Get full text
article -
40