Search alternatives:
encoding algorithm » cosine algorithm (Expand Search)
mining algorithms » learning algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
encoding algorithm » cosine algorithm (Expand Search)
mining algorithms » learning algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
-
41
Orthogonal Learning Rosenbrock’s Direct Rotation with the Gazelle Optimization Algorithm for Global Optimization
Published 2022“…The IGOA was compared with several other proposed meta-heuristic algorithms. Moreover, the Wilcoxon signed-rank test further assessed the experimental results to conduct more systematic data analyses. …”
Get full text
-
42
Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study
Published 2021“…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …”
Get full text
article -
43
-
44
Sentiment analysis for Arabizi in social media. (c2015)
Published 2015“…Yalla 7abibi, it is very useful to have a data mining tool that can analyze the sentiment of Twitter users in the Arab world. …”
Get full text
Get full text
masterThesis -
45
-
46
Design of adaptive arrays based on element position perturbations
Published 1993“…The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …”
Get full text
Get full text
article -
47
-
48
The Use of Microwave Tomography in Bone Healing Monitoring
Published 2019Get full text
doctoralThesis -
49
A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks
Published 2022“…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …”
-
50
-
51
-
52
-
53
-
54
A kernelization algorithm for d-Hitting Set
Published 2010“…For 3-Hitting Set, an arbitrary instance is reduced into an equivalent one that contains at most 5k2+k elements. This kernelization is an improvement over previously known methods that guarantee cubic-order kernels. …”
Get full text
Get full text
Get full text
article -
55
A Machine Learning Approach to Predicting Diabetes Complications
Published 2021Get full text
doctoralThesis -
56
Recent Advances of Chimp Optimization Algorithm: Variants and Applications
Published 2023“…The review paper will be helpful for the researchers and practitioners of ChOA belonging to a wide range of audiences from the domains of optimization, engineering, medical, data mining, and clustering. As well, it is wealthy in research on health, environment, and public safety. …”
Get full text
-
57
Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements
Published 2023“…<p dir="ltr">This work proposes an original preconditioner that couples the Constrained Pressure Residual (CPR) method with block preconditioning for the efficient solution of the linearized systems of equations arising from fully implicit multiphase flow models. …”
-
58
Intelligent Rapidly-Exploring Random Tree Star Algorithm
Published 2024Get full text
doctoralThesis -
59
Predictive Model of Psychoactive Drugs Consumption using Classification Machine Learning Algorithms
Published 2023“…Our study aimed to use data mining classification techniques, in order to classify the individual into two categories: user or non-user. …”
Get full text
-
60
Evolutionary algorithms for state justification in sequential automatic test pattern generation
Published 2005“…A common search operation in sequential Automatic Test Pattern Generation is to justify a desired state assignment on the sequential elements. State justification using deterministic algorithms is a difficult problem and is prone to many backtracks, which can lead to high execution times. …”
Get full text
article