Search alternatives:
research algorithm » search algorithm (Expand Search)
setting algorithm » scheduling algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
research algorithm » search algorithm (Expand Search)
setting algorithm » scheduling algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
-
1
Data reductions and combinatorial bounds for improved approximation algorithms
Published 2016“…Kernelization algorithms in the context of Parameterized Complexity are often based on a combination of data reduction rules and combinatorial insights. …”
Get full text
Get full text
Get full text
Get full text
article -
2
Physical optimization algorithms for mapping data to distributed-memory multiprocessors
Published 1992“…We also present a technique for efficient mapping of large data sets. The algorithms include a parallel genetic algorithm (PGA), a parallel neural network algorithm (PNN) and a parallel simulated annealing algorithm (PSA). …”
Get full text
Get full text
Get full text
masterThesis -
3
Mapping realistic data sets on parallel computers
Published 1993Get full text
Get full text
Get full text
Get full text
conferenceObject -
4
Compressed sensing based image denoising: novel patch-based collaborative algorithms
Published 2020Get full text
masterThesis -
5
Methodology for Analyzing the Traditional Algorithms Performance of User Reviews Using Machine Learning Techniques
Published 2020“…This conclusion was achieved after preprocessing a number of data values from these data sets.</p><h2>Other Information</h2><p dir="ltr">Published in: Algorithms<br>License: <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.3390/a13080202" target="_blank">https://dx.doi.org/10.3390/a13080202</a></p>…”
-
6
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …”
Get full text
-
7
-
8
-
9
Gradient-Based Optimizer (GBO): A Review, Theory, Variants, and Applications
Published 2023“…This paper introduces a comprehensive survey of a new population-based algorithm so-called gradient-based optimizer (GBO) and analyzes its major features. …”
Get full text
-
10
Automatic keyword extraction from a real estate classifieds data set
Published 2011“…Keywords are considered to be a solution to this problem and are now widely used to search the information over the internet.In this project we analyze a real estate classifieds data set, with an objective to find keywords that represent this data set. …”
Get full text
-
11
-
12
Allocating data to distributed-memory multiprocessors by genetic algorithms
Published 2016“…We present three genetic algorithms (GAs) for allocating irregular data sets to multiprocessors. …”
Get full text
Get full text
Get full text
article -
13
Teaching–learning-based optimization algorithm: analysis study and its application
Published 2024“…The teaching–learning-based optimization (TLBO) algorithm is a novel nature-based optimization approach that has attracted a lot of interest from researchers because of its great capacity to handle optimization problems. …”
Get full text
-
14
How can algorithms help in segmenting users and customers? A systematic review and research agenda for algorithmic customer segmentation
Published 2023“…We found researchers employing 46 different algorithms and 14 different evaluation metrics. …”
-
15
Variable Selection in Data Analysis: A Synthetic Data Toolkit
Published 2024“…Variable (feature) selection plays an important role in data analysis and mathematical modeling. This paper aims to address the significant lack of formal evaluation benchmarks for feature selection algorithms (FSAs). …”
Get full text
article -
16
Using genetic algorithms to optimize software quality estimation models
Published 2004“…In the first approach, we assume the existence of several models, and we use a genetic algorithm to combine them, and adapt them to a given data set. …”
Get full text
Get full text
Get full text
masterThesis -
17
Eye-Clustering: An Enhanced Centroids Prediction for K-means Algorithm
Published 2024“…To achieve this goal, supervised machine learning was employed to train models on graphs with labeled data points, where each graph contains a set of points and a label indicating the centroid determined by K-means. …”
Get full text
Get full text
Get full text
masterThesis -
18
Efficient Dynamic Cost Scheduling Algorithm for Data Batch Processing
Published 2016Get full text
doctoralThesis -
19
Hardening the ElGamal cryptosystem in the setting of the second group of units. (c2011)
Published 2011Get full text
Get full text
masterThesis -
20
DG-Means – A Superior Greedy Algorithm for Clustering Distributed Data
Published 2022“…In this work, we present DG-means, which is a greedy algorithm that performs on distributed sets of data. …”
Get full text
Get full text
Get full text
masterThesis