Search Results - (( data evaluation based algorithm ) OR ( sequence optimization based algorithm ))
Search alternatives:
- evaluation based »
- data evaluation »
-
1
Evaluating Bees Algorithm for Sequence-based T-way Testing Test Data Generation
Published 2018“…However, very few strategies have been proposed for sequence-based t-way. This paper presents statistical analysis on the performance of Bees Algorithm against the other sequence t-way strategies, in order to generate test cases.…”
Get full text
Get full text
Get full text
Article -
2
VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern
Published 2012“…GA is a widely used optimization algorithm based on the concept of survival of the fittest. …”
Get full text
Get full text
Thesis -
3
Development of an augmented reality based facility layout planning and optimization / Tan Chee Hau
Published 2020“…This study presents an augmented reality (AR) based facility layout planning (FLP) system with an optimization algorithm to assist facility layout designers in decision making. …”
Get full text
Get full text
Get full text
Thesis -
4
On iterative low-complexity algorithm for optimal antenna selection and joint transmit power allocation under impact pilot contamination in downlink 5g massive MIMO systems
Published 2020“…In conclusion, the proposed low-complexity iterative algorithm can be used to maximize the EE based on the maximum transmit power , where the noise power is less than the power of the received pilot sequence.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Improving Attentive Sequence-to-Sequence Generative-Based Chatbot Model Using Deep Neural Network Approach
Published 2022“…Hence, this research’s objective aimed to propose an optimization strategy based on Structural Modification and Optimizing Training Network for improving the lacking of accuracy of response in the chatbot application, to propose the algorithm enhancement to improve the current attention mechanism in the Attentive Sequence-to-Sequence model and the network’s training optimization of its inability to memorize the dialogue history, and lastly, to evaluate the accuracy of response of the proposed solution through data training on loss function and real data testing. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems
Published 2019“…Moreover, other than the memory-based feature, SED algorithm has fewer design parameters to be addressed and the independence of the gain sequence in the tuning process. …”
Get full text
Get full text
Thesis -
7
Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems
Published 2019“…Moreover, other than the memory-based feature, SED algorithm has fewer design parameters to be addressed and the independence of the gain sequence in the tuning process. …”
Get full text
Get full text
Thesis -
8
Flock optimization algorithm-based deep learning model for diabetic disease detection improvement
Published 2024“…Then flock optimization algorithm is applied to detect the sequence; this process is used to reduce the convergence and optimization problems. …”
Get full text
Get full text
Article -
9
-
10
Biological-based semi-supervised clustering algorithm to improve gene function prediction
Published 2011“…We tested our new computational framework for semi-supervised clustering of yeast gene expression data based onmultiple functional annotation databases. …”
Get full text
Get full text
Article -
11
Intelligent Manufacturing Planning System Using Dispatch Rules: A Case Study in Roofing Manufacturing Industry
Published 2022“…Consequently, on-time delivery could be achieved. Tests based on real data have been set up to evaluate the performance of the proposed algorithm in sorting the received orders. …”
Get full text
Get full text
Article -
12
Ant system with heuristics for capacitated vehicle routing problem
Published 2013“…The ASH algorithm is basically applied with its probabilistic decision rule and pheromone feedback to construct the sequences of customers to be visited in the CVRP solution. …”
Get full text
Get full text
Thesis -
13
Bitcoin price prediction using machine learning
Published 2023“…This study proposes three types of machine learning algorithms (LSTM, GRU, and Prophet) with two types of architectural configurations (Sequence-to-Sequence and Sequence-to-One) to predict Bitcoin’s closing price based on 1 year of Bitcoin historical data, (2, April 2022 to 2, April 2023). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Evaluation and optimization of frequent, closed and maximal association rule based classification
Published 2014“…Real world applications of association rule mining have well-known problems of discovering a large number of rules, many of which are not interesting or useful for the application at hand.The algorithms for closed and maximal item sets mining significantly reduce the volume of rules discovered and complexity associated with the task, but the implications of their use and important differences with respect to the generalization power, precision and recall when used in the classification problem have not been examined.In this paper, we present a systematic evaluation of the association rules discovered from frequent, closed and maximal item set mining algorithms, combining common data mining and statistical interestingness measures, and outline an appropriate sequence of usage.The experiments are performed using a number of real-world datasets that represent diverse characteristics of data/items, and detailed evaluation of rule sets is provided as a whole and w.r.t individual classes. …”
Get full text
Get full text
Article -
15
Topology-aware hypergraph based approach to optimize scheduling of parallel applications onto distributed parallel architectures
Published 2020“…For these reasons, to improve the time and accuracy of the coverage in population-based meta-heuristics and their utilization in HPAs, this thesis presents a novel optimization algorithm called the Raccoon Optimization Algorithm (ROA). …”
Get full text
Get full text
Thesis -
16
Examining the round trip time and packet length effect on window size by using the Cuckoo search algorithm
Published 2016“…This signifies that the training was successful based on the fitted values of the window size. Thus the proposed model trained with the CS algorithm provides a high convergence rate to the true global minimum and a better optimal solution. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Data-driven neuroendocrine-pid tuning based on safe experimentation dynamics for control of TITO coupled tank system with stochastic input delay
Published 2019“…The SED algorithm is an optimization method used as data-driven tools to find the optimal control parameters by using the input-output (I/O) data measurement in an actual system. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
A study on component-based technology for development of complex bioinformatics software
Published 2004“…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
Get full text
Get full text
Monograph -
19
An enhanced swap sequence-based particle swarm optimization algorithm to solve TSP
Published 2021“…To improve the performance of the swap sequence based PSO, this paper introduces an Enhanced Swap Sequence based PSO (Enhanced SSPSO) algorithm by integrating the strategies of the Expanded PSO (XPSO) in the swap sequence based PSO. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
Multiple and solid data background scheme for testing static single cell faults on SRAM memories
Published 2013“…Therefore, the purpose of this thesis is to introduce a Data Background (DB) scheme to generate an optimal March Test Algorithm (MTA) for detecting faults of memory that are undetectable using existing algorithms. …”
Get full text
Get full text
Thesis
