Search alternatives:
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
-
221
Optimum sensors allocation for drones multi-target tracking under complex environment using improved prairie dog optimization
Published 2024“…The IPDOA performance was compared with the other 8 metaheuristic optimization algorithms and the testing showed its superiority over those techniques for solving this complex problem. …”
Get full text
-
222
Modelling Exchange Rates during Currency Crisis using Neural Networks
Published 2006“…Exchange rate data from the Lebanese currency crisis period of 1985-1992 is used for training, testing and evaluation of the models. …”
Get full text
Get full text
Get full text
conferenceObject -
223
A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems
Published 2025“…<p dir="ltr">Federated Learning (FL) is gaining traction in Android-based consumer electronics, enabling collaborative model training across decentralized devices while preserving data privacy. However, the increasing adoption of FL in these devices exposes them to adversarial attacks that can compromise user data and device security. …”
-
224
A comparative study of regression testing methods. (c1996)
Published 1996Get full text
Get full text
masterThesis -
225
A simple approach for testing web service based applications
Published 2005“…Test cases are executed automatically using a test execution algorithm and a test framework is also presented. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
226
Predicting Plasma Vitamin C Using Machine Learning
Published 2022“…The objective of this study is to predict plasma vitamin C using machine learning. The NHANES dataset was used to predict plasma vitamin C in a cohort of 2952 American adults using regression algorithms and clustering in a way that a hypothetical health application might. …”
-
227
Stochastic Search Algorithms for Exam Scheduling
Published 2007“…Then, we empirically compare the three proposed algorithms and FESP using realistic data. Our experimental results show that SA and GA produce good exam schedules that are better than those of FESP heuristic procedure. …”
Get full text
Get full text
article -
228
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
Published 2023“…Techniques for natural language processing may be used to text data to extract useful features like sentiment, emotion, and subjectivity. …”
Get full text
-
229
-
230
Robust Control Of Sampled Data Systems
Published 2020“…They then present a numerical controller design algorithm based on the derived bounds. Examples are used for demonstration.…”
Get full text
article -
231
Robust Control Of Sampled Data Systems
Published 2020“…They then present a numerical controller design algorithm based on the derived bounds. Examples are used for demonstration.…”
Get full text
article -
232
Robust Control Of Sampled Data Systems
Published 2020“…They then present a numerical controller design algorithm based on the derived bounds.Examples are used for demonstration.…”
Get full text
article -
233
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
Published 2024“…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …”
-
234
Bee Colony Algorithm for Proctors Assignment.
Published 2015Get full text
Get full text
Get full text
article -
235
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
Published 2022“…<p>Communication has become a lot easier in this era of technology, development of high-speed computer networks, and the inexpensive uses of Internet. Therefore, data transmission has become vulnerable to and unsafe from different external attacks. …”
-
236
Multi-Cluster Jumping Particle Swarm Optimization for Fast Convergence
Published 2020“…Keeping in view the need of an optimization algorithm with fast convergence speed, suitable for high dimensional data space, this article proposes a novel concept of Multi-Cluster Jumping PSO. …”
-
237
Optimal scheduling algorithm for residential building distributed energy source systems using Levy flight and chaos-assisted artificial rabbits optimizer
Published 2023“…Based on the average Friedman’s ranking test values, the proposed algorithm stands first with 1.82 for numerical and real-world scheduling problems.…”
Get full text
Get full text
Get full text
article -
238
Optimal scheduling algorithm for residential building distributed energy source systems using Levy flight and chaos-assisted artificial rabbits optimizer
Published 2023“…Based on the average Friedman’s ranking test values, the proposed algorithm stands first with 1.82 for numerical and real-world scheduling problems. …”
-
239
Unsupervised outlier detection in multidimensional data
Published 2022“…<p>Detection and removal of outliers in a dataset is a fundamental preprocessing task without which the analysis of the data can be misleading. Furthermore, the existence of anomalies in the data can heavily degrade the performance of machine learning algorithms. …”
-
240
Estimation of the methanol loss in the gas hydrate prevention unit using the artificial neural networks: Investigating the effect of training algorithm on the model accuracy
Published 2023“…Adjusting the weight and bias of the ANN model using an optimization algorithm is known as the training process. …”