Showing 11,441 - 11,460 results of 19,511 for search '"algorithm"', query time: 0.10s Refine Results
  1. 11441

    Penggunaan Metode Naïve Bayes Classifier pada Analisis Sentimen Penilaian Masyarakat Terhadap Pelayanan Rumah Sakit di Malang by Tsania Dzulkarnain, Dian Eka Ratnawati, Bayu Rahayudi

    Published 2024-10-01
    “…The author utilizes the Naive Bayes Classifier algorithm and Cross Validation to categorize assessments based on positive and negative sentiments, as well as 4 aspects to facilitate categorization. …”
    Get full text
    Article
  2. 11442

    Determination of Sequential Well Placements Using a Multi-Modal Convolutional Neural Network Integrated with Evolutionary Optimization by Seoyoon Kwon, Minsoo Ji, Min Kim, Juliana Y. Leung, Baehyun Min

    Published 2024-12-01
    “…This complex multi-million-dollar problem involves optimizing multiple parameters using computationally intensive reservoir simulations, often employing advanced algorithms such as optimization algorithms and machine/deep learning techniques to find near-optimal solutions efficiently while accounting for uncertainties and risks. …”
    Get full text
    Article
  3. 11443

    The benefits and trade-offs of multi-variable calibration of the WaterGAP global hydrological model (WGHM) in the Ganges and Brahmaputra basins by H. M. M. Hasan, P. Döll, P. Döll, S.-M. Hosseini-Moghari, F. Papa, A. Güntner, A. Güntner

    Published 2025-01-01
    “…This indicates an overfitting to the singular observation time series by the calibration algorithm. We therefore propose a transparent algorithm to identify high-performing Pareto solutions under consideration of observational uncertainties of the calibration data.…”
    Get full text
    Article
  4. 11444

    Penerapan Algoritma Deep Learning Convolutional Neural Network Dalam Menentukan Kematangan Buah Jeruk Manis Berdasarkan Citra Red Green Blue (RGB) by Budi Yanto, Erni Rouza, Luth Fimawahib, B.Herawan Hayadi, Rinanda Rizki Pratama

    Published 2023-02-01
    “…For this reason, an algorithm is needed to determine sweet oranges with a computerized system created using the Convolutional Neural Network (CNN) algorithm, which is one of the deep learning algorithms, which is the development of Multilayer Perceptron (MLP), which is able to process data in two-dimensional form, for example. …”
    Get full text
    Article
  5. 11445

    PROSPECTS FOR THE DEVELOPMENT OF BIODIESEL PRODUCTION IN UKRAINE WITH CONSIDERATION OF SOCIO-ECONOMIC AND ENVIRONMENTAL EFFICIENCY by Ihor Kupchuk, Tatiana Yemchyk, Yaroslav Gontaruk

    Published 2024-12-01
    “…Graphical representation was employed for the creation of a diagram illustrating an algorithm for biodiesel and by-product production within an energy co-operative. …”
    Get full text
    Article
  6. 11446

    Penerapan Metode K-Medoids untuk Pengelompokan Mahasiswa Berpotensi Drop Out by Syamsul Bahri, Dwi Marisa Midyanti

    Published 2023-02-01
    “…K-Medoids is a data mining method that can solve clustering problems. In this algorithm, the representation of a cluster uses objects in a set of objects. …”
    Get full text
    Article
  7. 11447

    Pengamanan Pesan E-Complaint Fasilitas dan Kinerja Civitas Akademika Menggunakan Algoritma RSA by Dwi Yuny Sylfania, Fransiskus Panca Juniawan, Laurentinus Laurentinus, Hengki Hengki

    Published 2022-12-01
    “…The use of cryptographic techniques with the RSA algorithm is used as a solution to prevent message leakage. …”
    Get full text
    Article
  8. 11448

    Klasifikasi Ulasan Palsu Menggunakan Borderline Over Sampling (BOS) dan Support Vector Machine (SVM) (Studi Kasus : Ulasan Tempat Makan) by Aisyah Awalina, Fitra Abdurrachman Bachtiar, Indriati Indriati

    Published 2022-02-01
    “…However, many of these spam review datasets are imbalanced and thus may affect classification results. In this study, BOS algorithm was used to overcome data imbalances, and SVM algorithm for the classification of spam reviews. …”
    Get full text
    Article
  9. 11449

    An Emotion-Driven Vocal Biomarker-Based PTSD Screening Tool by Thomas F. Quatieri, Jing Wang, James R. Williamson, Richard DeLaura, Tanya Talkar, Nancy P. Solomon, Stefanie E. Kuchinsky, Megan Eitel, Tracey Brickell, Sara Lippa, Kristin J. Heaton, Douglas S. Brungart, Louis French, Rael Lange, Jeffrey Palmer, Hayley Reynolds

    Published 2024-01-01
    “…Our algorithm was tested on a subset of data from the DVBIC-TBICoE TBI Study, which contains PTSD Check List Civilian (PCL-C) assessment scores. …”
    Get full text
    Article
  10. 11450

    Optimization Design of Structures Subjected to Transient Loads Using First and Second Derivatives of Dynamic Displacement and Stress by Qimao Liu, Jing Zhang, Liubin Yan

    Published 2012-01-01
    “…., gradient-Hessian matrix-based method or second order method, of frame structures subjected to the transient loads. An algorithm of first and second derivatives of dynamic displacement and stress with respect to design variables is formulated based on the Newmark method. …”
    Get full text
    Article
  11. 11451

    Supply Capability Evaluation of Intelligent Manufacturing Enterprises Based on Improved BP Neural Network by Quan Quan, Zhongqiang Zhang

    Published 2022-01-01
    “…In this paper, based on the traditional backpropagation (BP) neural network, combined with the improved particle swarm optimization (PSO) algorithm, and on the basis of the supplier evaluation index system, the supplier efficiency evaluation model of intelligent manufacturing enterprises based on DPMPSO-BP neural network is constructed. …”
    Get full text
    Article
  12. 11452

    Devil’s Vortex Phase Structure as Frequency Plane Mask for Image Encryption Using the Fractional Mellin Transform by Sunanda Vashisth, Hukum Singh, A. K. Yadav, Kehar Singh

    Published 2014-01-01
    “…The phase key for decryption is obtained by an iterative phase retrieval algorithm. The proposed scheme has been validated for grayscale secret target images, by numerical simulation. …”
    Get full text
    Article
  13. 11453

    Hidden Markov model based P2P flow identification technique by Bo XU, Ming CHEN, Xiang-lin WEI

    Published 2012-06-01
    “…To identify various P2P flows accurately in real-time,a hidden Markov model(HMM)based P2P flow identification technique was proposed.This approach made use of packet size,inter-arrival time and arrival order to construct flow identification model,in which discrete random variable was used to depict the characteristics of HMM state.A framework called HMM-FIA was proposed,which could identify various P2P flows simultaneously.Meanwhile,the algorithm for selecting the number of HMM state was designed.In a controllable experimental circumstance in the campus network,HMM-FIA was utilized to identify P2P flows and was compared with other identification methods.The results show that discrete random variable can decrease the model constructing time and improve the time-cost and accuracy in identifying unknown flows,HMM-FIA can correctly identify the packet flows produced by various P2P protocols and it can be adaptive to different network circumstance.…”
    Get full text
    Article
  14. 11454

    A Total Variation Model Based on the Strictly Convex Modification for Image Denoising by Boying Wu, Elisha Achieng Ogada, Jiebao Sun, Zhichang Guo

    Published 2014-01-01
    “…Additional distinction from the other methods is that the parameters, for manual manipulation, in the proposed algorithm are reduced to basically only one.…”
    Get full text
    Article
  15. 11455

    Surrogate Assisted Design Optimization of an Air Turbine by Rameez Badhurshah, Abdus Samad

    Published 2014-01-01
    “…A Reynolds-averaged Navier Stokes solver was used to evaluate the objective function responses, and these responses along with the design variables were used to construct the Kriging variants and RSA functions. A hybrid genetic algorithm was used to find the optimal point in the design space. …”
    Get full text
    Article
  16. 11456

    Application of Fast P2P Traffic Recognition Technology Based on Decision Tree in the Detection of Network Traffic Data by Lin Zheng, Junjiao Li

    Published 2022-01-01
    “…Based on the research of traffic identification in recent years, a fast P2P network traffic anomaly identification algorithm based on decision tree model is proposed, which improves the efficiency and accuracy of network traffic application identification and network traffic anomaly data identification.…”
    Get full text
    Article
  17. 11457

    A New Spectral Local Linearization Method for Nonlinear Boundary Layer Flow Problems by S. S. Motsa

    Published 2013-01-01
    “…We propose a simple and efficient method for solving highly nonlinear systems of boundary layer flow problems with exponentially decaying profiles. The algorithm of the proposed method is based on an innovative idea of linearizing and decoupling the governing systems of equations and reducing them into a sequence of subsystems of differential equations which are solved using spectral collocation methods. …”
    Get full text
    Article
  18. 11458

    A Novel Multiband Miniature Planar Inverted F Antenna Design for Bluetooth and WLAN Applications by J. M. Jeevani W. Jayasinghe, Disala Uduwawala

    Published 2015-01-01
    “…A novel compact planar inverted F antenna (PIFA) optimized using genetic algorithms for 2.4 GHz (Bluetooth) and 5 GHz (UNII-1, UNII-2, UNII-2 extended, and UNII-3) bands is presented. …”
    Get full text
    Article
  19. 11459

    Trusted cloud platform management model based onTPMalliance by Jun-feng TIAN, Fang-shu CHANG

    Published 2016-02-01
    “…It usedTPMand authentication encryption technology to solve trusted transmission problem of data among nodes inTPMalliance, and a management strategy of time-based treeTPMalliance was proposed, including node configuration protocol, node registration protocol, node logout protocol, node state real-time monitor protocol, trusted nodes management network repair protocol, node update protoc explains the production algorithm of time-based tree, analyses the effectiveness of the time cost of building trusted node management network and monitoring of node state. …”
    Get full text
    Article
  20. 11460

    Influence of Parameter on Dynamic Load and Load Sharing Characteristic of Split Torque-combine Power Gear Transmission System by He Lin, Sanmin Wang

    Published 2019-05-01
    “…By applying the fourth order Runge-Kutta algorithm to solve the system dimensionless dynamical equations, dynamic load characteristic is analyzed under the excitations of backlash, general transmission error and time-varying mesh stiffness. …”
    Get full text
    Article