Search alternatives:
pattern research » pain research (Expand Search)
Showing 1,121 - 1,140 results of 2,101 for search 'pattern research algorithms', query time: 0.17s Refine Results
  1. 1121
  2. 1122

    Prediksi Stok dan Pengaturan Tata Letak Barang Menggunakan Kombinasi Algoritma Triple Exponential Smoothing dan FP-Growth by Kristoko Dwi Hartomo, Sri Yulianto Prasetyo, Rahmat Abadi Suharjo

    Published 2020-10-01
    “…FP-Growth algorithm to find out user behavior patterns can be used to develop Triple Exponential Smoothing decisions and algorithms which are forecasting algorithms for inventory items. …”
    Get full text
    Article
  3. 1123

    Enhanced climate change resilience on wheat anther morphology using optimized deep learning techniques by Arifa Zahir, Zulfiqar Ali, Ahmad Sami Al-Shamayleh, Syed Raza Ab bas, Basharat Mahmood, Abdullah Hussein Al-Ghushami, Rubina Adnan, Adnan Akhunzada

    Published 2024-10-01
    “…Various Deep Learning algorithms, including Convolution Neural Network (CNN), LeNet, and Inception-V3 are implemented to classify the records and extract various patterns. …”
    Get full text
    Article
  4. 1124
  5. 1125
  6. 1126

    Comparison of High-Resolution Digital Elevation Models for Customizing Hydrological Analysis of Urban Basins: Considerations, Opportunities, and Implications for Stormwater System... by Walter Avila-Ruiz, Carlos Salazar-Briones, José Mizael Ruiz-Gibert, Marcelo A. Lomelí-Banda, Juan Alejandro Saiz-Rodríguez

    Published 2025-02-01
    “…Although some studies claim to have obtained the same results using different software and algorithms, in this research, different results were obtained, and emphasize the importance of establishing procedural standards, as they can significantly impact the design of stormwater drainage systems. …”
    Get full text
    Article
  7. 1127
  8. 1128

    ADPO: Adaptive DRAM Controller for Performance Optimization by Zhuorui Liu, Yan Li, Xiaoyang Zeng

    Published 2025-03-01
    “…The research methodology involves implementing a rank-level timing aware read/write turnaround arbiter and setting read/write queue thresholds and read/write turnaround settings based on observed patterns. …”
    Get full text
    Article
  9. 1129

    A Progressive Clustering Approach for Buildings Using MST and SOM with Feature Factors by Tianliang Zhang, Xiaoji Lan, Jianhua Feng

    Published 2025-02-01
    “…To address the challenges in current research on spatial clustering algorithms for buildings in topographic maps—namely, their limited ability to effectively accommodate diverse application scenarios, including dense and regular urban environments, sparsely and irregularly distributed rural areas, and urban villages with complex structures—this paper introduces an innovative progressive clustering algorithm framework. …”
    Get full text
    Article
  10. 1130
  11. 1131
  12. 1132

    Introduction to Computational Creativity by Anna Longo, ChatGPT

    Published 2025-04-01
    “…By deconstructing the cognitive processes involved in human creativity, researchers can design algorithms that simulate these processes. …”
    Get full text
    Article
  13. 1133

    Study Comparison Deep Learning and Support Vector Machine for Face Mask Detection by Rani Kurnia Putri, Muhammad Athoillah*

    Published 2025-06-01
    “…Both algorithms have proven to be powerful tools for any classification problem specially to classify or identify image patterns. …”
    Get full text
    Article
  14. 1134
  15. 1135
  16. 1136

    Machine learning-based characteristic identification of MSG content in gravy foods by Rosyady Phisca Aditya, Habibah Nurina Umy, Masita, Yudhana Anton

    Published 2024-01-01
    “…This research determines the identification of MSG using the Machine Learning method Naive Bayes classifier algorithm in Python software. …”
    Get full text
    Article
  17. 1137

    VIRUS CHANGE MODEL IN ORGANIZATIONAL TRANSFORMATION by A. Dolgaya

    Published 2018-09-01
    “…Virus technology organizational changes model is presented as an outcome of multidisciplinary research. The model consists of organizational virus structure, chang-es algorithm and immune instruments for process interruption. …”
    Get full text
    Article
  18. 1138
  19. 1139

    Locality-guided based optimization method for bounded model checker by Shun WANG, Ye DU, Zhen HAN, Jiqiang LIU

    Published 2018-03-01
    “…For software model checking,approaches that combine with different kind of verification methods are now under research.The key to improve scale and complexity of verifiable software is handling the method for abstraction widening and strengthening wisely and precisely.To archive that,using extra knowledge that extracted from programming pattern or learned through verifying procedure to help eliminate the redundant state has been proved effective.Definition of program locality was given.It took the important role in accelerating software verification,then the strategy was raised and an algorithm was implemented to take advantage of program locality.This method exploits the features of modern BMC (bounded model checker) and scales up the capability of its power in large scale and comprehensive software modules.…”
    Get full text
    Article
  20. 1140

    A Deep Learning Model Leveraging Time-Series System Call Data to Detect Malware Attacks in Virtual Machines by A. Alfred Raja Melvin, Jaspher W. Kathrine, Andrew Jeyabose, D. Cenitta

    Published 2025-03-01
    “…The raw VMM system call traces are transformed into novel Time Series System Call patterns and utilized by a deep learning algorithm for training and building the classifier model. …”
    Get full text
    Article