Search alternatives:
testing algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
testing algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
-
221
Cyberbullying Detection and Abuser Profile Identification on Social Media for Roman Urdu
Published 2024Subjects: -
222
Novel Peak Detection Algorithms for Pileup Minimization in Gamma Ray Spectroscopy
Published 2006“…The classification technique has the unique feature of cutting down the computation largely by only allowing the event of interest to be executed by a particular algorithm. The set-up was also tested with random signals from a 137Cs test source. …”
Get full text
Get full text
article -
223
Assessment of static pile design methods and non-linear analysis of pile driving
Published 2006“…Pile displacement is accurately predicted when compared to field test results. The resistance curves along the pile shaft and base properly reflect the nonlinear soil behavior. …”
Get full text
Get full text
Get full text
masterThesis -
224
Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms
Published 2022“…The LR model showed the foremost predictions of ground loss as compared to all the other models analyzed. …”
-
225
I Will Survive: An Event-driven Conformance Checking Approach Over Process Streams
Published 2023“…This paper introduces a new approximate algorithm – I Will Survive (IWS). The algorithm utilizes the trie data structure to improve the calculation speed, while remaining memory-efficient. …”
Get full text
Get full text
Get full text
-
226
A hybridization of evolution strategies with iterated greedy algorithm for no-wait flow shop scheduling problems
Published 2024“…The performance of the HES-IG algorithm is calibrated with other algorithms using the Wilcoxon signed test. …”
-
227
A Multiswarm Intelligence Algorithm for Expensive Bound Constrained Optimization Problems
Published 2021“…The suggested algorithm integrates the SI-based algorithms to evolve population and handle exploration versus exploitation issues. …”
-
228
A new multiobjective evolutionary algorithm forenvironmental/economic power dispatch
Published 2001“…A new nondominated sorting genetic algorithm (NSGA) based approach is proposed to handle the problem as a true multiobjective optimization problem with competing and noncommensurable objectives. …”
Get full text
Get full text
article -
229
Integrating genetic algorithms, tabu search, and simulatedannealing for the unit commitment problem
Published 1999“…This paper presents a new algorithm based on integrating genetic algorithms, tabu search and simulated annealing methods to solve the unit commitment problem. …”
Get full text
Get full text
article -
230
A Modular Reconfigurable Architecture for Asymmetric and Symmetric-key Cryptographic Algorithms
Published 2007“…Preliminary results show throughput values equivalent to FPGA based implementations for most of the tested ciphers, and approaching ASIC based implementations. …”
Get full text
masterThesis -
231
-
232
A parallel genetic algorithm for the geometrically constrained site layout problem
Published 2018“…The algorithm is parallelized based on a message passing architecture using parallel search and chromosomes migration. …”
Get full text
Get full text
Get full text
conferenceObject -
233
A method for optimizing test bus assignment and sizing for system-on-a-chip
Published 2017“…We present experimental results that demonstrate the effectiveness of our method while outperforming reported techniques.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
234
Adapted arithmetic optimization algorithm for multi-level thresholding image segmentation: a case study of chest x-ray images
Published 2023“…The picture histogram is used to display the algorithm's potential solutions. The proposed approach is tested on five frequent photos from the Berkeley University database. …”
Get full text
-
235
-
236
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
Published 2024“…Exploratory Data Analysis (EDA) highlights the class imbalance problem in detecting fake jobs, which tends the model to act aggressively toward the minority class. …”
-
237
Customs Trade Facilitation and Compliance for Ecommerce using Blockchain and Data Mining
Published 2021“…Additionally, the Cross Industry Standard Process for Data Mining (CRISP-DM) methodology is employed for modelling the two proposed clustering algorithms to identify transactional risks. …”
Get full text
-
238
Experimental Investigation and Comparative Evaluation of Standard Level Shifted Multi-Carrier Modulation Schemes With a Constraint GA Based SHE Techniques for a Seven-Level PUC Inv...
Published 2019“…Different standard multicarrier sinusoidal pulse-width modulation techniques (SPWMs) are adapted for the generation of switching gate signals for the PUC power switches, and these SPWMs are compared with novel optimization-based selective harmonic elimination (SHE) that employs genetic algorithm (GA) for solving nonlinear SHE equation with a constraint that eliminated all third-order harmonics efficiently. …”
-
239
Predicting long-term type 2 diabetes with support vector machine using oral glucose tolerance test
Published 2019“…In this paper, we present an automatic tool that uses machine learning techniques to predict the development of type 2 diabetes mellitus (T2DM). Data generated from an oral glucose tolerance test (OGTT) was used to develop a predictive model based on the support vector machine (SVM). …”
-
240
Efficient methods and techniques for the open-shop scheduling problem. (c2006)
Published 2006Get full text
Get full text
masterThesis