Search Results - (( data optimization method algorithm ) OR ( data applications usage algorithm ))
Search alternatives:
- applications usage »
- data optimization »
- data applications »
- method algorithm »
- usage algorithm »
-
1
Design of radix-4 single path delay fast fourier transform processor with genetic algorithms optimization
Published 2011“…The genetic algorithms is proven to be a very effective method in optimization by using the way imitating natural process of living beings such as crossover, mutation and selection. …”
Get full text
Get full text
Thesis -
2
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
Published 2016“…However, their performances are not well optimized. This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. …”
Get full text
Get full text
Get full text
Article -
3
Multi-objective optimization of stand-alone hybrid renewable energy system by genetic algorithm
Published 2013“…Among these methods, Genetic Algorithm and Particle Swarm Optimization are known as two most effective methods for HRESs. …”
Get full text
Get full text
Thesis -
4
Representation Of Rational Bézier Quadratics Using Genetic Algorithm, Differential Evolution And Particle Swarm Optimization
Published 2013“…Three soft computing techniques namely Genetic Algorithm (GA), Differential Evolution (DE) and Particle Swarm Optimization (PSO) are utilized for the desired manipulation of curves and surfaces. …”
Get full text
Get full text
Thesis -
5
Assisted History Matching by Using Genetic Algorithm and Discrete Cosine Transform
Published 2014“…Later, an algorithm combining both Genetic Algorithm and Discrete Cosine Transform was proposed, which shows the step-by-step sequence of both methods. …”
Get full text
Get full text
Final Year Project -
6
Optimizing LSTM S2S models with Evolutionary Mating Algorithm (EMA) for direct multi-step forecasting of household electrical power consumption
Published 2026“…EMA successfully identifies optimal parameters, and EMA-optimized model achieved a significant improvement in accuracy over to baseline methods. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS
Published 2019“…The proposed project will extract the features of system calls, network packets, CPU usage and battery usage of the application. The proposed project achieves overall accuracy level of 96.67% using Sequential Minimal Optimization classifier.…”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
8
Bayesian Framework based Brain Source Localization Using High SNR EEG Data
Published 2019“…These sources can be localized using different optimization algorithms. This localization information is usable for diagnoses of brain disorders such as epilepsy, Schizophrenia, depression and Alzheimer. …”
Get full text
Get full text
Conference or Workshop Item -
9
Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks
Published 2012“…The first scheme is a SensorAnt, which is a self-optimization mechanism for WSN. It is able to utilize and optimize the sensor nodes’ resources, especially the batteries, to achieve balanced energy consumption across all sensor nodes. …”
Get full text
Get full text
Thesis -
10
Short Text Classification Using An Enhanced Term Weighting Scheme And Filter-Wrapper Feature Selection
Published 2018“…In the second stage, grey wolf optimization (GWO) algorithm, a new heuristic search algorithm, uses the SVM accuracy as a fitness function to find the optimal subset feature.…”
Get full text
Get full text
Thesis -
11
Dynamic user preference parameters selection and energy consumption optimization for smart homes using deep extreme learning machine and bat algorithm
Published 2020“…We have used the Bat algorithm and fuzzy logic to optimize energy consumption and comfort index management. …”
Get full text
Get full text
Get full text
Article -
12
An efficient unknown detection approach for RFID data stream management system
Published 2025“…A novel algorithm called SWOR (Sliding Window XOR-based Detection) is introduced, specifically designed to identify unknown tags within RFID data streams. …”
Get full text
Get full text
Get full text
Article -
13
P300 detection of brain signals using a combination of wavelet transform techniques
Published 2012“…Meanwhile the new approaches in channels selection methods help the algorithms for convenient online usage.…”
Get full text
Get full text
Thesis -
14
Energy-efficient routing using novel optimization with Tabu techniques for Wireless Sensor Network
Published 2022“…Compared to the existing algorithms, the proposed method outperforms better and improves the lifetime of the network.…”
Get full text
Get full text
Get full text
Article -
15
A study on component-based technology for development of complex bioinformatics software
Published 2004“…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
Get full text
Get full text
Monograph -
16
Utilizing the Kolmogorov-Arnold Networks for chiller energy consumption prediction in commercial building
Published 2024“…Traditional predictive methods often struggle to capture the complex, nonlinear relationships inherent in energy consumption data. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Utilizing the Kolmogorov-Arnold Networks for chiller energy consumption prediction in commercial building
Published 2024“…Traditional predictive methods often struggle to capture the complex, nonlinear relationships inherent in energy consumption data. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Groundwater quality assessment and optimization of monitored wells using multivariate geostatistical techniques in Amol-Babol Plain, Iran
Published 2015“…Therefore, monitoring network wells should be optimized in information-cost-effective way, based on the current groundwater quality data and vulnerability of aquifer to contamination. …”
Get full text
Get full text
Thesis -
19
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…The results show that proposed method provides an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.…”
Get full text
Get full text
Thesis -
20
