Search alternatives:
code algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
based rd » based _ (Expand Search)
search » research (Expand Search)
code algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
based rd » based _ (Expand Search)
search » research (Expand Search)
-
21
-
22
Fuzzy simulated evolution algorithm for topology design of campusnetworks
Published 2000“…To diversify the search, we have also incorporated tabu search-based characteristics in the allocation phase of the SE algorithm. …”
Get full text
Get full text
article -
23
A FUZZY EVOLUTIONARY ALGORITHM FOR TOPOLOGY DESIGN OF CAMPUS NETWORKS
Published 2020“…To intensify the search, we have also incorporated Tabu Search-based characteristics in the allocation phase of the SE algorithm. …”
Get full text
article -
24
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006“…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …”
Get full text
Get full text
article -
25
Evolutionary algorithms for state justification in sequential automatic test pattern generation
Published 2005“…Evolutionary algorithms have been effective in solving many search and optimization problems. …”
Get full text
article -
26
-
27
Unsupervised Deep Learning for Classification Of Bats Calls Using Acoustic Data
Published 2021Get full text
doctoralThesis -
28
Minimum UAV fog servers with maximum IoT devices association using genetic algorithms
Published 2021Get full text
Get full text
Get full text
Get full text
conferenceObject -
29
Joint energy-distortion aware algorithms for cooperative video streaming over LTE networks
Published 2013“…Videos with single description coding (SDC), multiple description coding (MDC), and scalable video coding (SVC) are considered. …”
Get full text
Get full text
Get full text
article -
30
Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators
Published 2021“…The outcomes of the DNA microarray is a table/matrix, called gene expression data. Pattern recognition algorithms are widely applied to gene expression data to differentiate between health and cancerous patient samples. …”
Get full text
-
31
Molecular Classification of Breast Cancer Utilizing Long Non-Coding RNA (lncRNA) Transcriptomes Identifies Novel Diagnostic lncRNA Panel for Triple-Negative Breast Cancer
Published 2021“…The identification of long non-coding RNAs (lncRNAs) and the roles they play in cancer progression has recently proven to be beneficial. …”
-
32
Socially Motivated Approach to Simulate Negotiation Process
Published 2014Get full text
doctoralThesis -
33
Autonomous Demand-Side Management in the Future Smart Grid
Published 2016Get full text
doctoralThesis -
34
Bird’s Eye View feature selection for high-dimensional data
Published 2023“…BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …”
-
35
-
36
-
37
Impact Of Multidisciplinary Maternal Resuscitation Training Program on Improving the Front-Line Care Provider’s Readiness to Manage Maternal Cardiac Arrest: A Pre-test/Post-test St...
Published 2024“…The multidisciplinary resuscitation teams were observed during the cardiac arrest mock drills both before and after conducting the multidisciplinary resuscitation simulation-based training program and the introduction of the maternal resuscitation algorithm pathway against seven KPIs. Those KPIs were Time to Confirm Cardiac Arrest; Code Blue and /or Code White Activation Time; Time to attempt first chest compression; Defibrillator Arrival Time; Time to First Defibrillation shock; Code blue/code white arrival time and Time to perform Perimortem Caesarean Delivery.…”
-
38
Practical Multiple Node Failure Recovery in Distributed Storage Systems
Published 2016“…The fractional repetition (FR) code is a class of regenerating codes that consists of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
39
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
Published 2022“…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …”
-
40