Search Results - (( java implementation modified algorithm ) OR ( risk optimization search algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- optimization search »
- risk optimization »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm
Published 2025“…Complementing this, the Harmony Search Algorithm (HSA) is incorporated to augment data features, facilitating better pattern recognition and enhancing overall classification accuracy through optimized feature engineering. …”
Get full text
Get full text
Get full text
Article -
3
Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman
Published 2019“…In future, this work could be enhanced for better performances in both aspects using another variant of the PSO or other potential metaheuristic searching techniques such as Firefly Optimization, Bat Algorithm and etc.…”
Get full text
Get full text
Thesis -
4
Framework of Meta-Heuristic Variable Length Searching for Feature Selection in High-Dimensional Data
Published 2023“…The literature contains various meta-heuristic algorithms with variable length searching. All of them enable searching in high dimensional problems. …”
Get full text
Get full text
Get full text
Article -
5
Framework of Meta-Heuristic Variable Length Searching for Feature Selection in High-Dimensional Data
Published 2023“…The literature contains various meta-heuristic algorithms with variable length searching. All of them enable searching in high dimensional problems. …”
Get full text
Get full text
Get full text
Article -
6
Framework of Meta-Heuristic Variable Length Searching for Feature Selection in High-Dimensional Data
Published 2023“…The literature contains various meta-heuristic algorithms with variable length searching. All of them enable searching in high dimensional problems. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Improved cuckoo search based neural network learning algorithms for data classification
Published 2014“…In the proposed HACPSO algorithm, initially accelerated particle swarm optimization (APSO) algorithm searches within the search space and finds the best sub-search space, and then the CS selects the best nest by traversing the sub-search space. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Algorithmic Loan Risk Prediction Method Based on PSO-EBGWO-Catboost
Published 2024“…Under the background of big data, it is of practical significance to prevent loan risk by the machine learning algorithm. Aiming at the characteristics of unbalanced loan data and high noise, this paper proposes an improved Gray Wolf optimization strategy (PSOEBGWO). …”
Get full text
Get full text
Get full text
Article -
10
-
11
A Hybrid Adaptive Leadership GWO Optimization with Category Gradient Boosting on Decision Trees Algorithm for Credit Risk Control Classification
Published 2024“…Hence, the second step entails enhancing the GWO algorithm, referred to as the EBGWO algorithm. This enhanced version of the Grey Wolf Optimization algorithm possesses robust global search capabilities and helps alleviate some of the local convergence issues inherent in the original GWO algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Full waveform inversion based on genetic local search algorithm with hybrid-grid scheme
Published 2019“…This method combines GA with coarse grid as a global search and gradient-based optimization with fine grid as a local search to directly deliver high-resolution model, while reducing the risk to be trapped in a local minimum. …”
Get full text
Get full text
Conference or Workshop Item -
13
Improving the efficiency of minimum determinant computation in space time trellis code with optimal subtree pruning
Published 2024“…Although the algorithm is relatively efficient, it is not optimized in terms of the pruning strategy. …”
Get full text
Get full text
Get full text
Article -
14
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
15
Optimizing Visual Sensors Placement with Risk Maps Using Dynamic Programming
Published 2022“…This article explores the efficiency of the visual sensor placement based on a combination of two methods namely, a deterministic risk estimation for the risk assessment and a dynamic programming for optimizing the placement of surveillance cameras. …”
Get full text
Get full text
Article -
16
Whale optimization algorithm strategies for higher interaction strength t-way testing
Published 2022“…To ensure that WOA conquers premature convergence and avoids local optima for large search spaces (owing to high-order interaction), three variants of WOA have been developed, namely Structurally Modified Whale Optimization Algorithm (SWOA), Tolerance Whale Optimization Algorithm (TWOA), and Tolerance Structurally Modified Whale Optimization Algorithm (TSWOA). …”
Get full text
Get full text
Get full text
Article -
17
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
18
-
19
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
20
Optimization of medical image steganography using n-decomposition genetic algorithm
Published 2023“…To overcome these limitations, this study proposes a technique known as an n-decomposition genetic algorithm. This algorithm uses a variable-length search to identify the best location to embed the secret message by incorporating constraints to avoid local minimum traps. …”
Get full text
Get full text
Get full text
Thesis
