Search alternatives:
using algorithm » cosine algorithm (Expand Search)
based methods » based method (Expand Search), mixed methods (Expand Search)
search » research (Expand Search)
using algorithm » cosine algorithm (Expand Search)
based methods » based method (Expand Search), mixed methods (Expand Search)
search » research (Expand Search)
-
141
Scatter search for protein structure prediction. (c2008)
Published 2008Get full text
Get full text
masterThesis -
142
-
143
Sample intelligence-based progressive hedging algorithms for the stochastic capacitated reliable facility location problem
Published 2024“…To manage uncertainty and decide effectively, stochastic programming (SP) methods are often employed. Two commonly used SP methods are approximation methods, i.e., Sample Average Approximation (SAA), and decomposition methods, i.e., Progressive Hedging Algorithm (PHA). …”
-
144
Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm
Published 2022“…The antecedent part parameters (Gaussian membership function parameters) are encoded as a population of artificial swarm of grasshoppers and optimized using its algorithm. Tuning of the consequent part parameters are accomplished using extreme learning machine. …”
-
145
Real-Time Selective Harmonic Mitigation Technique for Power Converters Based on the Exchange Market Algorithm
Published 2020“…The performance of the EMA-based SHM is presented showing experimental results considering a reduced number of switching angles applied to a specific three-level converter, but the method can be extrapolated to any other three-level converter topology.…”
-
146
-
147
Assessment of Drug-Induced QTc Prolongation in Mental Health Practice: Validation of an Evidence-Based Algorithm
Published 2023“…</p></h3><h3>Methods</h3><h3><p dir="ltr">Following an initial face validity by content experts, a cross-sectional survey of mental health care practitioners with a 4-point Likert-type scale was used to assess the validity of the decision steps on the QTcIP algorithm (QTcIPA) by estimating the content validity index (CVI) and the modified kappa statistic (κ*). …”
-
148
Practical single node failure recovery using fractional repetition codes in data centers
Published 2016“…Hence, a practical solution for node failures is presented by using a self-designed genetic algorithm that searches within the feasible solution space. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
149
A Fast and Robust Gas Recognition Algorithm Based on Hybrid Convolutional and Recurrent Neural Network
Published 2019“…In order to address this issue, in this paper, we propose a novel hybrid approach with both convolutional and recurrent neural networks combined, which is based on the long short-term memory module. Featuring the capability of learning the correlations of time-series data, the proposed deep learning method is well-suited for extracting the valuable transient feature contained in the very beginning of the response curve. …”
-
150
Salak Image Classification Method Based Deep Learning Technique Using Two Transfer Learning Models
Published 2022“…Deep learning is the most promising algorithm compared to another Machine Learning (ML) algorithm. …”
Get full text
-
151
-
152
Wind, Solar, and Photovoltaic Renewable Energy Systems with and without Energy Storage Optimization: A Survey of Advanced Machine Learning and Deep Learning Techniques
Published 2022“…This paper covered the most resent and important researchers in the domain of renewable problems using the learning-based methods. Various types of Deep Learning (DL) and Machine Learning (ML) algorithms employed in Solar and Wind energy supplies are given. …”
Get full text
-
153
A Review of the Genetic Algorithm and JAYA Algorithm Applications
Published 2022“…On the other a well-known and somewhat older evolutionary based method called the Genetic Algorithm with applications is also presented here. …”
Get full text
-
154
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
Published 2007“…To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …”
Get full text
Get full text
Get full text
article -
155
FarmTech: Regulating the use of digital technologies in the agricultural sector
Published 2023“…<p dir="ltr">Farming relies on the accurate collection and processing of data. Algorithms utilizing artificial intelligence can predict patterns and spot problems, helping farmers make more informed decisions. …”
-
156
Wearable wrist to finger photoplethysmogram translation through restoration using super operational neural networks based 1D-CycleGAN for enhancing cardiovascular monitoring
Published 2024“…TTR-GAN comprises cascaded dual-stage 1D Cycle Generative Adversarial Networks (1D-CycleGANs) constructed using Super-ONNs. In the first phase, corrupted wPPG waveforms are blindly restored using a 1D-CycleGAN-based restoration framework. …”
-
157
Distributed Tree-Based Machine Learning for Short-Term Load Forecasting With Apache Spark
Published 2021“…The paper proposes a concurrent job scheduling algorithm in a multi-energy data source environment using Apache Spark. …”
-
158
Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators
Published 2021“…Moreover, the results of MGWO are compared with seven state-of-art gene selection methods using the same datasets based on classification accuracy and the number of selected genes. …”
Get full text
-
159
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
Published 2023“…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …”
-
160