Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
used algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search)
box algorithm » rd algorithm (Expand Search)
experiments » experimental (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
used algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search)
box algorithm » rd algorithm (Expand Search)
experiments » experimental (Expand Search)
-
81
LOCATING DAMAGES IN THIN ALUMINIUM PLATES USING LAMB WAVES AND AGENETIC OPTIMIZATION APPROACH
Published 2021“…The lamb wave signals for interrogating the plate structure are obtained using experiments and a sparse array of four piezoelectric wafer (PW) transducers. …”
Get full text
-
82
-
83
Developing a UAE-Based Disputes Prediction Model using Machine Learning
Published 2022Get full text
doctoralThesis -
84
Efficiency Optimization of a Standalone Solar Energy System using Fuzzy Based MPPT
Published 2012Get full text
doctoralThesis -
85
-
86
StackDPPred: Multiclass prediction of defensin peptides using stacked ensemble learning with optimized features
Published 2024“…Thus, the shortcomings of wet lab experiments are leveraged by computational methods to accurately predict the functional types of DPs. …”
-
87
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …”
Get full text
-
88
-
89
A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining
Published 2021“…Third, a text mining algorithm has been implemented. Fourth, the systematic approach has been modeled using business process modeling notation. …”
-
90
-
91
An App for Navigating Patient Transportation and Acute Stroke Care in Northwestern Ontario Using Machine Learning: Retrospective Study
Published 2024“…We aimed to develop an app using a comprehensive geomapping navigation and estimation system based on machine learning algorithms. …”
-
92
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
Published 2022“…This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
-
93
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
Published 2022“…All the experiments were conducted using the pitch-catch method in presence of surface damages on head of the Rail track. …”
Get full text
-
94
-
95
Clustering records in information retrieval systems. (c1995)
Published 1995Get full text
Get full text
masterThesis -
96
Oversampling techniques for imbalanced data in regression
Published 2024“…For tabular data we conducted a comprehensive experiment using various models trained on both augmented and non-augmented datasets, followed by performance comparisons on test data. …”
-
97
Benchmark on a large cohort for sleep-wake classification with machine learning techniques
Published 2019“…We identified among the traditional algorithms, two approaches that perform better than the algorithm implemented by the actigraphy device used in the MESA Sleep experiments. …”
-
98
-
99
A Modified Oppositional Chaotic Local Search Strategy Based Aquila Optimizer to Design an Effective Controller for Vehicle Cruise Control System
Published 2023“…CEC2019 test suite is also used to perform ablation experiments to reveal the separate contributions of chaotic local search and modified opposition-based learning strategies to the CmOBL-AO algorithm. …”
Get full text
-
100