Search Results - (( using execution tree algorithm ) OR ( using optimization method algorithm ))
Search alternatives:
- method algorithm »
- using execution »
- execution tree »
- tree algorithm »
-
1
Disparity map algorithm using hierarchical of bitwise pixel differences and segment-tree from stereo image
Published 2024“…The adaptability of the algorithm is demonstrated through a 3D surface reconstruction using a final disparity map. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
State of charge estimation for lithium-ion battery based on random forests technique with gravitational search algorithm
Published 2023Conference Paper -
3
Optimizing B-tree search performance of big data sets / Mohsen Marjani
Published 2017“…This study proposes an optimized B-tree search method to improve the execution time of the search tasks and to optimize the performance of the B-tree search process. …”
Get full text
Get full text
Get full text
Thesis -
4
Disparity map algorithm for stereo matching process using local based method
Published 2022“…Then, the optimization stage uses a Winner-Take-All (WTA) strategy. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Discovering optimal features using static analysis and a genetic search based method for Android malware detection
Published 2018“…To evaluate the best features determined by GS, we used five machine learning classifiers, namely, Naïve Bayes (NB), Functional Trees (FT), J48, Random Forest (RF), and Multilayer Perceptron (MLP). …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Discovering optimal features using static analysis and a genetic search based method for Android malware detection
Published 2018“…To evaluate the best features determined by GS, we used five machine learning classifiers, namely, Naïve Bayes (NB), functional trees (FT), J48, random forest (RF), and multilayer perceptron (MLP). …”
Get full text
Get full text
Article -
7
Modelling and optimization of microhardness of electroless Ni-P-TiO2composite coating based on machine learning approaches and RSM
Published 2021“…The microhardness of the electroless Ni-P-TiO2 coated composite was measured and predicted by various machine learning algorithms. The recorded datasets were used for optimization by Response Surface Methodology (RSM) model whereas, training and testing of the four different Artificial Intelligence (AI) models were executed using machine learning methods. …”
Get full text
Get full text
Article -
8
A study on component-based technology for development of complex bioinformatics software
Published 2004“…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
Get full text
Get full text
Monograph -
9
Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks
Published 2012“…Finally, we propose Self-Decision Route Selection scheme which is an improvement of the Hop-based Spanning Tree (HST) algorithm that is used in some routing protocols such as AODV and DSR. …”
Get full text
Get full text
Thesis -
10
-
11
Enhance efficiency of answering XML keyword query using incompact structure of MCCTree
Published 2012“…If the result cannot be used directly by the ranking method, the algorithm has an ineffective process. …”
Get full text
Get full text
Thesis -
12
-
13
The stopping rules for winsorized tree
Published 2017“…This mechanism is controlled by the proposed algorithm. In winsorized tree, data are screened for identifying outlier.If outlier is detected, the value is neutralized using winsorize approach. …”
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Speeding up index construction with GPU for DNA data sequences
Published 2011“…The advancement of technology in scientific community has produced terabytes of biological data.This datum includes DNA sequences.String matching algorithm which is traditionally used to match DNA sequences now takes much longer time to execute because of the large size of DNA data and also the small number of alphabets.To overcome this problem, the indexing methods such as suffix arrays or suffix trees have been introduced.In this study we used suffix arrays as indexing algorithm because it is more applicable, not complex and used less space compared to suffix trees.The parallel method is then introduced to speed up the index construction process. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
17
An optimized attack tree model for security test case planning and generation
Published 2018“…By leveraging on the optimized attack tree algorithm used in this research work, the threat model produces efficient test plans from which adequate test cases are derived to ensure a secured web application is designed, implemented and deployed. …”
Get full text
Get full text
Article -
18
Application of genetic algorithm methods to optimize flowshop sequencing problem
Published 2008“…Genetic algorithm method was one of the methods that were widely used in solving optimization problem. …”
Get full text
Get full text
Undergraduates Project Papers -
19
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…Moreover,improper management of intermediate databases may adversely affect the execution time and memory utilization. In the present work, Separator Database is proposed to improve PrefixSpan with pseudoprojection through early removal of uneconomical in-memory sequenced database, whilst SPM-Tree framework is proposed to build the intermediated databases. …”
Get full text
Thesis -
20
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
Get full text
Get full text
Thesis
