-
11441
Penggunaan Metode Naïve Bayes Classifier pada Analisis Sentimen Penilaian Masyarakat Terhadap Pelayanan Rumah Sakit di Malang
Published 2024-10-01“…The author utilizes the Naive Bayes Classifier algorithm and Cross Validation to categorize assessments based on positive and negative sentiments, as well as 4 aspects to facilitate categorization. …”
Get full text
Article -
11442
Determination of Sequential Well Placements Using a Multi-Modal Convolutional Neural Network Integrated with Evolutionary Optimization
Published 2024-12-01“…This complex multi-million-dollar problem involves optimizing multiple parameters using computationally intensive reservoir simulations, often employing advanced algorithms such as optimization algorithms and machine/deep learning techniques to find near-optimal solutions efficiently while accounting for uncertainties and risks. …”
Get full text
Article -
11443
The benefits and trade-offs of multi-variable calibration of the WaterGAP global hydrological model (WGHM) in the Ganges and Brahmaputra basins
Published 2025-01-01“…This indicates an overfitting to the singular observation time series by the calibration algorithm. We therefore propose a transparent algorithm to identify high-performing Pareto solutions under consideration of observational uncertainties of the calibration data.…”
Get full text
Article -
11444
Penerapan Algoritma Deep Learning Convolutional Neural Network Dalam Menentukan Kematangan Buah Jeruk Manis Berdasarkan Citra Red Green Blue (RGB)
Published 2023-02-01“…For this reason, an algorithm is needed to determine sweet oranges with a computerized system created using the Convolutional Neural Network (CNN) algorithm, which is one of the deep learning algorithms, which is the development of Multilayer Perceptron (MLP), which is able to process data in two-dimensional form, for example. …”
Get full text
Article -
11445
PROSPECTS FOR THE DEVELOPMENT OF BIODIESEL PRODUCTION IN UKRAINE WITH CONSIDERATION OF SOCIO-ECONOMIC AND ENVIRONMENTAL EFFICIENCY
Published 2024-12-01“…Graphical representation was employed for the creation of a diagram illustrating an algorithm for biodiesel and by-product production within an energy co-operative. …”
Get full text
Article -
11446
Penerapan Metode K-Medoids untuk Pengelompokan Mahasiswa Berpotensi Drop Out
Published 2023-02-01“…K-Medoids is a data mining method that can solve clustering problems. In this algorithm, the representation of a cluster uses objects in a set of objects. …”
Get full text
Article -
11447
Pengamanan Pesan E-Complaint Fasilitas dan Kinerja Civitas Akademika Menggunakan Algoritma RSA
Published 2022-12-01“…The use of cryptographic techniques with the RSA algorithm is used as a solution to prevent message leakage. …”
Get full text
Article -
11448
Klasifikasi Ulasan Palsu Menggunakan Borderline Over Sampling (BOS) dan Support Vector Machine (SVM) (Studi Kasus : Ulasan Tempat Makan)
Published 2022-02-01“…However, many of these spam review datasets are imbalanced and thus may affect classification results. In this study, BOS algorithm was used to overcome data imbalances, and SVM algorithm for the classification of spam reviews. …”
Get full text
Article -
11449
An Emotion-Driven Vocal Biomarker-Based PTSD Screening Tool
Published 2024-01-01“…Our algorithm was tested on a subset of data from the DVBIC-TBICoE TBI Study, which contains PTSD Check List Civilian (PCL-C) assessment scores. …”
Get full text
Article -
11450
Optimization Design of Structures Subjected to Transient Loads Using First and Second Derivatives of Dynamic Displacement and Stress
Published 2012-01-01“…., gradient-Hessian matrix-based method or second order method, of frame structures subjected to the transient loads. An algorithm of first and second derivatives of dynamic displacement and stress with respect to design variables is formulated based on the Newmark method. …”
Get full text
Article -
11451
Supply Capability Evaluation of Intelligent Manufacturing Enterprises Based on Improved BP Neural Network
Published 2022-01-01“…In this paper, based on the traditional backpropagation (BP) neural network, combined with the improved particle swarm optimization (PSO) algorithm, and on the basis of the supplier evaluation index system, the supplier efficiency evaluation model of intelligent manufacturing enterprises based on DPMPSO-BP neural network is constructed. …”
Get full text
Article -
11452
Devil’s Vortex Phase Structure as Frequency Plane Mask for Image Encryption Using the Fractional Mellin Transform
Published 2014-01-01“…The phase key for decryption is obtained by an iterative phase retrieval algorithm. The proposed scheme has been validated for grayscale secret target images, by numerical simulation. …”
Get full text
Article -
11453
Hidden Markov model based P2P flow identification technique
Published 2012-06-01“…To identify various P2P flows accurately in real-time,a hidden Markov model(HMM)based P2P flow identification technique was proposed.This approach made use of packet size,inter-arrival time and arrival order to construct flow identification model,in which discrete random variable was used to depict the characteristics of HMM state.A framework called HMM-FIA was proposed,which could identify various P2P flows simultaneously.Meanwhile,the algorithm for selecting the number of HMM state was designed.In a controllable experimental circumstance in the campus network,HMM-FIA was utilized to identify P2P flows and was compared with other identification methods.The results show that discrete random variable can decrease the model constructing time and improve the time-cost and accuracy in identifying unknown flows,HMM-FIA can correctly identify the packet flows produced by various P2P protocols and it can be adaptive to different network circumstance.…”
Get full text
Article -
11454
A Total Variation Model Based on the Strictly Convex Modification for Image Denoising
Published 2014-01-01“…Additional distinction from the other methods is that the parameters, for manual manipulation, in the proposed algorithm are reduced to basically only one.…”
Get full text
Article -
11455
Surrogate Assisted Design Optimization of an Air Turbine
Published 2014-01-01“…A Reynolds-averaged Navier Stokes solver was used to evaluate the objective function responses, and these responses along with the design variables were used to construct the Kriging variants and RSA functions. A hybrid genetic algorithm was used to find the optimal point in the design space. …”
Get full text
Article -
11456
Application of Fast P2P Traffic Recognition Technology Based on Decision Tree in the Detection of Network Traffic Data
Published 2022-01-01“…Based on the research of traffic identification in recent years, a fast P2P network traffic anomaly identification algorithm based on decision tree model is proposed, which improves the efficiency and accuracy of network traffic application identification and network traffic anomaly data identification.…”
Get full text
Article -
11457
A New Spectral Local Linearization Method for Nonlinear Boundary Layer Flow Problems
Published 2013-01-01“…We propose a simple and efficient method for solving highly nonlinear systems of boundary layer flow problems with exponentially decaying profiles. The algorithm of the proposed method is based on an innovative idea of linearizing and decoupling the governing systems of equations and reducing them into a sequence of subsystems of differential equations which are solved using spectral collocation methods. …”
Get full text
Article -
11458
A Novel Multiband Miniature Planar Inverted F Antenna Design for Bluetooth and WLAN Applications
Published 2015-01-01“…A novel compact planar inverted F antenna (PIFA) optimized using genetic algorithms for 2.4 GHz (Bluetooth) and 5 GHz (UNII-1, UNII-2, UNII-2 extended, and UNII-3) bands is presented. …”
Get full text
Article -
11459
Trusted cloud platform management model based onTPMalliance
Published 2016-02-01“…It usedTPMand authentication encryption technology to solve trusted transmission problem of data among nodes inTPMalliance, and a management strategy of time-based treeTPMalliance was proposed, including node configuration protocol, node registration protocol, node logout protocol, node state real-time monitor protocol, trusted nodes management network repair protocol, node update protoc explains the production algorithm of time-based tree, analyses the effectiveness of the time cost of building trusted node management network and monitoring of node state. …”
Get full text
Article -
11460
Influence of Parameter on Dynamic Load and Load Sharing Characteristic of Split Torque-combine Power Gear Transmission System
Published 2019-05-01“…By applying the fourth order Runge-Kutta algorithm to solve the system dimensionless dynamical equations, dynamic load characteristic is analyzed under the excitations of backlash, general transmission error and time-varying mesh stiffness. …”
Get full text
Article