Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
-
221
Spider monkey optimizations: application review and results
Published 2024“…Optimization algorithms are applied to find efficient solutions in different problems in several fields such as the routing in wireless networks, cloud computing, big data, image processing and scheduling, and so forth. …”
Get full text
-
222
Salak Image Classification Method Based Deep Learning Technique Using Two Transfer Learning Models
Published 2022“…Deep learning is the most promising algorithm compared to another Machine Learning (ML) algorithm. …”
Get full text
-
223
-
224
Energy utilization assessment of a semi-closed greenhouse using data-driven model predictive control
Published 2021“…The proposed method consists of a multilayer perceptron model representing the greenhouse system integrated with an objective function and an optimization algorithm. …”
-
225
Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements
Published 2023“…<p dir="ltr">This work proposes an original preconditioner that couples the Constrained Pressure Residual (CPR) method with block preconditioning for the efficient solution of the linearized systems of equations arising from fully implicit multiphase flow models. …”
-
226
Cuckoo search for portfolio optimization. (c2014)
Published 2014Get full text
Get full text
masterThesis -
227
-
228
Optimization of Commercially Off the Shelf (COTS) Electric Propulsion System for Low Speed Fuel Cell UAV
Published 2013Get full text
doctoralThesis -
229
The effects of data balancing approaches: A case study
Published 2023“…Our results showed that the replacement method was effective, and LogisticRegression combined with the oversampling algorithms SMOTE or ADASYN, GaussianProcessClassifier with the oversampling algorithm SMOTE, and LinearDiscriminantAnalysis were the best performing models after log transformation of the dataset was followed by Recursive Feature Elimination.…”
-
230
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
Published 2024“…The accuracy of these models largely depends on the size and quality of the training dataset. …”
-
231
Recent Advances of Chimp Optimization Algorithm: Variants and Applications
Published 2023“…Chimp Optimization Algorithm (ChOA) is one of the recent metaheuristics swarm intelligence methods. …”
Get full text
-
232
Intelligent Rapidly-Exploring Random Tree Star Algorithm
Published 2024Get full text
doctoralThesis -
233
Data redundancy management for leaf-edges in connected environments
Published 2022“…Major advances in the fields of Internet and Communication Technology (ICT), data modeling/processing, and sensing technology have rendered traditional environments (e.g., cities, buildings) more connected. …”
Get full text
Get full text
Get full text
Get full text
article -
234
Evolutionary algorithm for predicting all-atom protein structure
Published 2011“…We present an improved version of a scatter search (SS) algorithm for predicting all-atoms protein structures using a recent energy model. …”
Get full text
Get full text
Get full text
conferenceObject -
235
A neural networks algorithm for data path synthesis
Published 2003“…The algorithm is driven by a motion equation that determines the neurons firing conditions based on the modified Hopfield neural network model of computation. …”
Get full text
Get full text
Get full text
article -
236
Optimizing Document Classification: Unleashing the Power of Genetic Algorithms
Published 2023“…Additionally, our proposed model optimizes the features using a genetic algorithm. …”
-
237
Formal synthesis of VLSI layouts from algorithmic specifications
Published 2020“…This formal high level syntesis system uses recursive algorithms to model the behaviour to be synthesized. …”
Get full text
article -
238
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
Get full text
-
239
A hybrid graph representation for recursive backtracking algorithms
Published 2017“…The performance of these algorithms often suffers from the increasing number of graph modifications, such as deletions, that reduce the problem instance and have to be “taken back” frequently during the search process. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
240
Spectrum Sensing Algorithms for Cooperative Cognitive Radio Networks
Published 2010Get full text
doctoralThesis