Search Results - (( data applications usage algorithm ) OR ( using optimization method algorithm ))
Search alternatives:
- applications usage »
- data applications »
- method algorithm »
- usage algorithm »
-
1
Design of radix-4 single path delay fast fourier transform processor with genetic algorithms optimization
Published 2011“…The genetic algorithms is proven to be a very effective method in optimization by using the way imitating natural process of living beings such as crossover, mutation and selection. …”
Get full text
Get full text
Thesis -
2
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
Published 2016“…However, their performances are not well optimized. This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. …”
Get full text
Get full text
Get full text
Article -
3
Multi-objective optimization of stand-alone hybrid renewable energy system by genetic algorithm
Published 2013“…Among these methods, Genetic Algorithm and Particle Swarm Optimization are known as two most effective methods for HRESs. …”
Get full text
Get full text
Thesis -
4
Assisted History Matching by Using Genetic Algorithm and Discrete Cosine Transform
Published 2014“…Overall, an algorithm showing the combination method of both GA and DCT was successfully developed. …”
Get full text
Get full text
Final Year Project -
5
Representation Of Rational Bézier Quadratics Using Genetic Algorithm, Differential Evolution And Particle Swarm Optimization
Published 2013“…These techniques have been used to optimize control points and weights in the description of spline functions used. …”
Get full text
Get full text
Thesis -
6
A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS
Published 2019“…The proposed project will extract the features of system calls, network packets, CPU usage and battery usage of the application. The proposed project achieves overall accuracy level of 96.67% using Sequential Minimal Optimization classifier.…”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
7
Short Text Classification Using An Enhanced Term Weighting Scheme And Filter-Wrapper Feature Selection
Published 2018“…In the second stage, grey wolf optimization (GWO) algorithm, a new heuristic search algorithm, uses the SVM accuracy as a fitness function to find the optimal subset feature.…”
Get full text
Get full text
Thesis -
8
Bayesian Framework based Brain Source Localization Using High SNR EEG Data
Published 2019“…These sources can be localized using different optimization algorithms. This localization information is usable for diagnoses of brain disorders such as epilepsy, Schizophrenia, depression and Alzheimer. …”
Get full text
Get full text
Conference or Workshop Item -
9
Dynamic user preference parameters selection and energy consumption optimization for smart homes using deep extreme learning machine and bat algorithm
Published 2020“…We applied a deep extreme learning machine approach to predict the user parameters. We have used the Bat algorithm and fuzzy logic to optimize energy consumption and comfort index management. …”
Get full text
Get full text
Get full text
Article -
10
P300 detection of brain signals using a combination of wavelet transform techniques
Published 2012“…Meanwhile the new approaches in channels selection methods help the algorithms for convenient online usage.…”
Get full text
Get full text
Thesis -
11
Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks
Published 2012“…Finally, we propose Self-Decision Route Selection scheme which is an improvement of the Hop-based Spanning Tree (HST) algorithm that is used in some routing protocols such as AODV and DSR. …”
Get full text
Get full text
Thesis -
12
Energy-efficient routing using novel optimization with Tabu techniques for Wireless Sensor Network
Published 2022“…Therefore, energy efficiency and load balancing are very essential in WSN. In the proposed method, a novel Grey Wolf Improved Particle Swarm Optimization with Tabu Search Techniques (GW-IPSO-TS) was used. …”
Get full text
Get full text
Get full text
Article -
13
A study on component-based technology for development of complex bioinformatics software
Published 2004“…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
Get full text
Get full text
Monograph -
14
Utilizing the Kolmogorov-Arnold Networks for chiller energy consumption prediction in commercial building
Published 2024“…The study introduces KAN as a novel application for real-world chiller energy prediction, using actual data obtained from a commercial building. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Instead of using traditional approach of selecting features with the highest eigenvalues such as PCA, this research applied a Genetic Algorithm (GA) to search the principal feature space that offers a subset of features with optimal sensitivity and the highest discriminatory power. …”
Get full text
Get full text
Thesis -
16
Utilizing the Kolmogorov-Arnold Networks for chiller energy consumption prediction in commercial building
Published 2024“…The study introduces KAN as a novel application for real-world chiller energy prediction, using actual data obtained from a commercial building. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
-
18
Groundwater quality assessment and optimization of monitored wells using multivariate geostatistical techniques in Amol-Babol Plain, Iran
Published 2015“…A new optimization approach was proposed for redesign monitoring network wells using optimization algorithm based on the vulnerability of aquifer to contaminations, estimation error of sampling wells, nearest distance between wells, and source of contamination in the study area. …”
Get full text
Get full text
Thesis -
19
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Instead of using traditional approach of selecting features with the highest eigenvalues such as PCA, this research applied a Genetic Algorithm (GA) to search the principal feature space that offers a subset of features with optimal sensitivity and the highest discriminatory power. …”
Get full text
Get full text
Thesis -
20
State-of-charge estimation for lithium-ion batteries with optimized self-supervised transformer deep learning model
Published 2023“…In the first stage, the model is pre-trained using unlabeled data with unsupervised learning. …”
text::Thesis
