Search Results - (( _ application during algorithm ) OR ( its selection based algorithm ))
Search alternatives:
- application during »
- during algorithm »
- selection based »
- its selection »
-
1
SURE-Autometrics algorithm for model selection in multiple equations
Published 2016“…However, most model selection algorithms such as Autometrics only concentrate on single equation modelling which has limited application. …”
Get full text
Get full text
Get full text
Thesis -
2
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…Q-Learning’s reward function assigns the highest value to the least frequently executed action without taking into consideration its potential ability in detecting failures. Furthermore, the proposed techniques based on the QLearning algorithm do not consider context-based actions. …”
Get full text
Get full text
Get full text
Thesis -
3
Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian
Published 2013“…In this research, we showed how evolutionary multi-objective algorithms can be used to solve the view selection problem and its advantage over classical optimization problems were described. …”
Get full text
Get full text
Thesis -
4
Utilizing the roulette wheel based social network search algorithm for substitution box construction and optimization
Published 2023“…This paper introduces a new variant of a recent metaheuristic algorithm based on the Social Network Search algorithm (SNS), which is called the Roulette Wheel Social Network Search algorithm (SNS). …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…The proposed algorithm is evaluated via computer simulation and modeling where its performance is verified against the few selected algorithms of the same nature. …”
Get full text
Get full text
Get full text
Article -
6
Exploring a Q-learning-based chaotic naked mole rat algorithm for S-box construction and optimization
Published 2023“…This paper introduces a new variant of the metaheuristic algorithm based on the naked mole rat (NMR) algorithm, called the Q-learning naked mole rat algorithm (QL-NMR), for substitution box construction and optimization. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Void avoidance opportunistic routing density rank based for underwater sensor networks
Published 2021“…Finally, the algorithm Void Avoidance Opportunistic Routing Density Rank Based (ORDRB) was developed to deal with the communication void by introducing a simple method to detect a void node and avoid it during the forwarding process. …”
Get full text
Get full text
Thesis -
8
The impact of news sentiment on the stock market fluctuation : the case of selected energy sector
Published 2021“…For the methodology, we first established a supervised machine learning algorithm-based news classifier to classify the OPEC news following its sentiments. …”
Get full text
Get full text
Get full text
Article -
9
A regression test case selection and prioritization for object-oriented programs using dependency graph and genetic algorithm
Published 2014“…The approach is based on optimization of selected test case from test suite T. …”
Get full text
Get full text
Get full text
Article -
10
Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks
Published 2013“…In the proposed HATSC scheme, the AHP method is uese for criteria weighting, while the TOPSIS method uses for the selection technique based on a multi-criteria decision-making algorithm is proposed. …”
Get full text
Get full text
Thesis -
11
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis -
12
Photovoltaic-based single-ended primary-inductor converter with dual-fuzzy logic control-based maximum power point tracking
Published 2016“…In this work, FLC was selected because it is easy to be implemented and does not require mathematical model in its design. …”
Get full text
Get full text
Thesis -
13
RISC-V instruction set extension on blockchain application
Published 2024“…One of the most common cryptographic algorithms used in blockchain would be selected in this paper, typically djb2 hash algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
An Experimental Study of Hyper-heuristic Selection and Acceptance Mechanism for Combinatorial T-Way Test Suite Generation
Published 2017“…Based on the experimental results, we offer insights on why each strategy differs in terms of its performance.…”
Get full text
Get full text
Get full text
Article -
15
Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process
Published 2004“…Artificial Neural Network (ANN) was selected from Machine Learning Algorithms to be the learning algorithm. …”
Get full text
Get full text
Thesis -
16
Analysis of parabolic antennas for radio telescopes and the development of encryption methods for radio astronomical images
Published 2022“…Thus, image security plays a significant role during the transmission process. Existing algorithms in image security were developed based on Latin squares, DNA sequence etc. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Cache replacement algorithm using hierarchical allocation scheduling
Published 2014“…HAS is to schedule the instructions based on the priority of instructions from the aspect of space and time. …”
Get full text
Get full text
Thesis -
18
A sequential handwriting recognition model based on a dynamically configurable convolution recurrent neural network and hybrid salp swarm algorithm
Published 2024“…The empirical results display that the proposed DC-CRNN and its SSA hybridization are capable of autonomously finding and selecting the best CRNN for a specific dataset. …”
Get full text
Get full text
Thesis -
19
A reliable time base routing framework with seamless networking operation for SDN / Nauman Khan
Published 2024“…PMTRF modules and their algorithms enable the isolation of the maintenance switch and the selection of the most reliable path for future affected flows based on input time provided by the administrator. …”
Get full text
Get full text
Get full text
Thesis -
20
