Search alternatives:
testing algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithms » cosine algorithm (Expand Search)
testing algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithms » cosine algorithm (Expand Search)
-
61
A hybrid distributed test generation method using deterministic and genetic algorithms
Published 2017“…The deterministic phase is based on the D-algorithm and generates an initial set of test vectors that are evolved in the genetic phase in order to achieve high fault coverage in a short time. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
62
Augmented arithmetic optimization algorithm using opposite-based learning and lévy flight distribution for global optimization and data clustering
Published 2022“…This paper proposes a new data clustering method using the advantages of metaheuristic (MH) optimization algorithms. …”
-
63
Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm
Published 2022“…Moreover, the image pixels in different and more similar areas of the image are located next to one another in a group and classified using the specified thresholds. As a result, the embedding capacity in each class can increase by reducing the value of the difference between two consecutive pixels, and the distortion of the marked image can decrease after inserting the personal data using the DE method. …”
Get full text
-
64
Novel Peak Detection Algorithms for Pileup Minimization in Gamma Ray Spectroscopy
Published 2006“…A number of parameter estimation and digital online peak localisation algorithms are being developed, including a pulse classification technique which uses a simple peak search routine based on the smoothed first derivative method, which gave a percentage error of peak amplitude of less than 1%. …”
Get full text
Get full text
article -
65
-
66
A Survey of Data Clustering Techniques
Published 2023“…Clustering, an unsupervised learning technique, aims to identify a specific number of clusters to effectively categorize the data through data grouping. Hence, clustering is related to many fields and is used in various applications that deal with large datasets. …”
Get full text
Get full text
Get full text
masterThesis -
67
-
68
A comparison of data mapping algorithms for parallel iterative PDE solvers
Published 1995“…We review and evaluate the performances of six data mapping algorithms used for parallel single-phase iterative PDE solvers with irregular 2-dimensional meshes on multicomputers. …”
Get full text
Get full text
Get full text
article -
69
An enhanced k-means clustering algorithm for pattern discovery in healthcare data
Published 2015“…This paper studies data mining applications in healthcare. Mainly, we study k-means clustering algorithms on large datasets and present an enhancement to k-means clustering, which requires k or a lesser number of passes to a dataset. …”
Get full text
Get full text
Get full text
Get full text
article -
70
Efficient Dynamic Cost Scheduling Algorithm for Financial Data Supply Chain
Published 2021“…The primary tool used in the data supply chain is data batch processing which requires efficient scheduling. …”
Get full text
article -
71
DG-Means – A Superior Greedy Algorithm for Clustering Distributed Data
Published 2022“…In this work, we present DG-means, which is a greedy algorithm that performs on distributed sets of data. …”
Get full text
Get full text
Get full text
masterThesis -
72
Extended Behavioral Modeling of FET and Lattice-Mismatched HEMT Devices
Published 2016Subjects: Get full text
doctoralThesis -
73
-
74
Power-constrained system-on-a-chip test scheduling using a genetic algorithm
Published 2006“…This paper presents an efficient approach for the test scheduling problem of core-based systems based on a genetic algorithm. …”
Get full text
Get full text
Get full text
article -
75
-
76
-
77
Parallel Algorithms for Distinguishing Nondeterministic Finite State Machines
Published 2015Get full text
doctoralThesis -
78
-
79
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
Published 2005Get full text
Get full text
Get full text
Get full text
conferenceObject -
80
A simple approach for testing web service based applications
Published 2005Get full text
Get full text
Get full text
Get full text
conferenceObject