Search alternatives:
mining algorithm » cosine algorithm (Expand Search)
data fitting » data mining (Expand Search), data hiding (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
data fitting » data mining (Expand Search), data hiding (Expand Search)
-
41
A Scatter search algorithm for exam scheduling. (c2006)
Published 2006Get full text
Get full text
masterThesis -
42
Nonlinear analysis of shell structures using image processing and machine learning
Published 2023“…We show that the results of the trained network agree well with the results of the nonlinear finite element analysis. …”
-
43
Orthogonal Learning Rosenbrock’s Direct Rotation with the Gazelle Optimization Algorithm for Global Optimization
Published 2022“…The gazelle optimization algorithm (GOA) is a global stochastic optimizer that is straightforward to comprehend and has powerful search capabilities. …”
Get full text
-
44
UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data
Published 2024“…Moreover, the study proposes a hybrid algorithm that combines UniBFS with two filter-based FS methods, ReliefF and Fisher, to identify pertinent features during the global search phase. …”
-
45
Data-Driven Electricity Demand Modeling for Electric Vehicles Using Machine Learning
Published 2024Get full text
doctoralThesis -
46
-
47
-
48
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Published 2022“…Due to a limited training dataset, an ML-based IDS generates a higher false detection ratio and encounters data imbalance issues. To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …”
-
49
-
50
A heuristics for HTTP traffic identification in measuring user dissimilarity
Published 2020“…The study utilizes HTTP request method of GET filtering, to develop a heuristic algorithm to identify user-initiated requests. The algorithm was experimentally tested on a group of users, to ascertain the certainty of identifying user-initiated requests. …”
-
51
-
52
An efficient claim management assurance system using EPC contract based on improved monarch butterfly optimization models
Published 2024“…To address these challenges, a claim management system is developed based on the Improved Monarch Butterfly Optimization Algorithm (IMBOA) and the principles of EPC. …”
-
53
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security
Published 2024“…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …”
-
54
An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection
Published 2022“…Many FS-based swarm intelligence algorithms have been used to tackle FS. …”
-
55
The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions
Published 2022“…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
-
56
-
57
-
58
-
59
Learning-Based Spectrum Sensing and Access for Cognitive Radio Systems
Published 2015Get full text
doctoralThesis -
60
An Optimal Approach for Assessing Weibull Parameters and Wind Power Potential for Six Coastal Cities in Pakistan
Published 2024“…When applied to wind speed data collected from six coastal cities in Pakistan: Gwadar, Jiwani, Karachi, Ormara, Pasni, and Sonmiani Bay, NEPFM exhibited poor fitting characteristics to the observed wind data. …”