Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
finding » findings (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
finding » findings (Expand Search)
-
121
An Extension Of Rahim And Banerjee'S Model For A Process With Upper And Lower Specification Limits
Published 2020“…We use Hooke and Jeeves search algorithm to optimize the model, and provide a numerical example.…”
Get full text
article -
122
Autonomous Vehicles Delivery Systems: Analyzing Vehicle Routing Problems with a Moving Depot
Published 2019Get full text
doctoralThesis -
123
Mobile robots obstacles avoidance using dynamic window approach
Published 2018Get full text
doctoralThesis -
124
Performance Prediction Using Classification
Published 2019“…Principal component analysis and feature selection by weights using information gain ratio, Gini index, correlation and PCA is used to determine the relevant predictors of the datasets used. This study also addresses gaps in the current available literature on performance prediction, such as data imbalance and the use of Ensemble models. …”
Get full text
-
125
Tailoring motivational health messages for smoking cessation using an mHealth recommender system integrated with an electronic health record: a study protocol
Published 2018“…Health recommender systems are information-filtering algorithms that can choose the most relevant health-related items—for instance, motivational messages aimed at smoking cessation—for each user based on his or her profile. …”
-
126
Impact of birth weight to placental weight ratio and other perinatal risk factors on left ventricular dimensions in newborns: a prospective cohort analysis
Published 2024“…Missing data were imputed with principal component analysis. …”
-
127
Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model
Published 2024“…The performance level improvements are practically summarized in both the transmission and reception entities with the help of the proposed hybrid network architecture and the associated Dual Deep Network algorithm. …”
-
128
Full-fledged semantic indexing and querying model designed for seamless integration in legacy RDBMS
Published 2018“…In the past decade, there has been an increasing need for semantic-aware data search and indexing in textual (structured and NoSQL) databases, as full-text search systems became available to non-experts where users have no knowledge about the data being searched and often formulate query keywords which are different from those used by the authors in indexing relevant documents, thus producing noisy and sometimes irrelevant results. …”
Get full text
Get full text
Get full text
Get full text
article -
129
Systems biology analysis reveals NFAT5 as a novel biomarker and master regulator of inflammatory breast cancer
Published 2015“…</p><h3>Methods</h3><p dir="ltr">In-silico modeling and Algorithm for the Reconstruction of Accurate Cellular Networks (ARACNe) on IBC/non-IBC (nIBC) gene expression data (n = 197) was employed to identify novel master regulators connected to the IBC phenotype. …”
-
130
The maximum common subgraph problem
Published 2017“…In the maximum common subgraph (MCS) problem, we are given a pair of graphs and asked to find the largest induced subgraph common to them both. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
131
Recovery of business intelligence systems
Published 2018“…The execution time of the recovery process is a crucial factor for measuring the performance because it is directly proportional to the denial of service time of any healthcare system. This paper presents a high performance damage assessment and recovery algorithm for e-healthcare systems. …”
Get full text
Get full text
Get full text
Get full text
article -
132
SDODV. (c2018)
Published 2018“…Therefore, the routing problem designated to find and maintain an optimal route between two nodes is not very straight forward. …”
Get full text
Get full text
Get full text
masterThesis -
133
-
134
An efficient method for the open-shop scheduling problem using simulated annealing
Published 2016“…This paper presents a simulated annealing algorithm in order to solve the nonpreemptive open-shop scheduling problem with the objective of minimizing the makespan. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
135
A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis
Published 2021“…Publishers should avoid noise in the data by developing a way to trace the evolution of individual publications and unique authors.…”
-
136
A data envelopment analysis model for opinion leaders’ identification in social networks
Published 2024“…The graph-based methods are one of the most important approaches for finding OLs in OSNs. Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. …”
-
137
-
138
Cyberbullying Detection Model for Arabic Text Using Deep Learning
Published 2023“…Hence, detecting any act of cyberbullying in an automated manner will be helpful for stakeholders to prevent any unfortunate results from the victim’s perspective. Data-driven approaches, such as machine learning (ML), par ticularly deep learning (DL), have shown promising results. …”
Get full text
-
139
Oversampling techniques for imbalanced data in regression
Published 2024“…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …”
-
140
Blockchain-Based Decentralized Architecture for Software Version Control
Published 2023“…The proof of authority (PoA) consensus algorithm will be used to approve the developer communicating modifications to the private blockchain network; the authority will only provide permission and will not be able to add, edit, or delete code files. …”