Search alternatives:
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data finding » data mining (Expand Search), data hiding (Expand Search)
from using » from urine (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data finding » data mining (Expand Search), data hiding (Expand Search)
from using » from urine (Expand Search)
-
1
A multi-class discriminative motif finding algorithm for autosomal genomic data. (c2015)
Published 2016“…New technologies, such as Next-Generation Genome Sequencing, can now provide huge amounts of data in little time. Big initiatives such as the International Hapmap Project and the 1000 Genome project are making use of these technologies to provide the scientific community with a detailed genetic reference from different populations. …”
Get full text
Get full text
masterThesis -
2
-
3
How can algorithms help in segmenting users and customers? A systematic review and research agenda for algorithmic customer segmentation
Published 2023“…<p dir="ltr">What algorithm to choose for customer segmentation? Should you use one algorithm or many? …”
-
4
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…We have suggested the SFL-HMM together with HMS-ACO process as a method used for detection of the cyber attacks. A MATLAB simulation used to evaluate the new strategy, and the metrics obtained from that simulation are compared to those obtained from the older methods. …”
Get full text
Get full text
-
5
-
6
-
7
Parallel genetic algorithm for disease-gene association
Published 2011“…Our results compared favorably with those of a recognized tag SNP selection algorithm using three different data sets from the HapMap project.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
8
A reduced model for phase-change problems with radiation using simplified PN approximations
Published 2025“…The integro-differential equation for the full radiative transfer is replaced by a set of differential equations which are independent of the angle variable and easy to solve using conventional computational methods. To solve the coupled equations, we implement a second-order implicit scheme for the time integration and a mixed finite element method for the space discretization. …”
Get full text
article -
9
Intelligent Rapidly-Exploring Random Tree Star Algorithm
Published 2024Get full text
doctoralThesis -
10
Haplotype inference by pure-parsimony using revamped delayed haplotype selection. (c2011)
Published 2011Get full text
Get full text
masterThesis -
11
-
12
Multi-Objective Optimisation of Injection Moulding Process for Dashboard Using Genetic Algorithm and Type-2 Fuzzy Neural Network
Published 2024“…Computational techniques, like the finite element method, are used to analyse behaviours based on varied input parameters. …”
-
13
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
Published 2007“…To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. Since even segmenting the log into clusters may not solve the problem, as clusters/segments may grow to be humongous in size, this is in case of high data/transaction dependency, we suggest a method for segmenting the log into clusters and its sub-clusters; i.e, segmenting the cluster; based on exact data dependency [12], into sub-clusters; based on two different criteria: number of data items or space occupied. …”
Get full text
Get full text
Get full text
article -
14
Extended Behavioral Modeling of FET and Lattice-Mismatched HEMT Devices
Published 2016Subjects: Get full text
doctoralThesis -
15
-
16
-
17
Formal synthesis of VLSI layouts from algorithmic specifications
Published 2020Get full text
article -
18
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
Published 2005“…To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
19
Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm
Published 2022“…The slime mould algorithm (SMA) gives good results in finding the best solutions to optimization problems. …”
Get full text
-
20