Showing 10,141 - 10,160 results of 25,328 for search 'research algorithm', query time: 0.26s Refine Results
  1. 10141
  2. 10142
  3. 10143
  4. 10144
  5. 10145
  6. 10146

    Presenting a multi-objective mathematical model with an integrated approach to scheduling and financial flow in production projects using NSGA-II by Sajad Janbaz, Seyed Mohammadreza Davoodi, Abdolmajid Abdolbaghi Ataabadi

    Published 2023-11-01
    “…Purpose: The current research aims to present a multi-objective mathematical model with an integrated approach to scheduling and financial flow in production projects using Non-dominated Sorting Genetic Algorithm II (NSGA-II).Methodology: This research presents a multi-objective mathematical model integrating scheduling and financial flow optimization in civil engineering projects. …”
    Get full text
    Article
  7. 10147
  8. 10148
  9. 10149

    Generalized Inverse of Quadri-Partitioned Neutrosophic Fuzzy Matrices and its Application to Decision-Making Problems by R. Jaya, S. Vimala

    Published 2025-07-01
    “…To the best of our knowledge, no existing algorithm addresses the computation of the g-inverse for QPNFMs. …”
    Get full text
    Article
  10. 10150

    Optimization of Distribution Path considering Cost and Customer Satisfaction under New Retail Modes by Dengqing Wang, Yuting Yang, Yanhu Wang

    Published 2021-01-01
    “…Moreover, the immune algorithm and genetic algorithm are adopted to achieve the model solution. …”
    Get full text
    Article
  11. 10151
  12. 10152

    Artificial Intelligent Techniques with Watermarking by Nada Saleem, Baydaa Khaleel, Shahbaa Khaleel

    Published 2009-07-01
    “…This research presents three robust blind watermarking algorithms in the discrete wavelet transform and spatial domain based on neural network and fuzzy logic artificial intelligent techniques. …”
    Get full text
    Article
  13. 10153

    Application of Improved WOA in Hammerstein Parameter Resolution Problems under Advanced Mathematical Theory by Lu Zhao, Jiangjun Liu, Yuan Li

    Published 2024-01-01
    “…With the development of industrial demand, precise identification of system models is currently required in the field of industrial control, which limits the whale search algorithm. In response to the fact that whale optimization algorithms are prone to falling into local optima and the identification of important Hammerstein models ignores the issue of noise outliers in actual industrial environments, this study improves the whale algorithm and constructs a Hammerstein model identification strategy for nonlinear systems under heavy-tailed noise using the improved whale algorithm. …”
    Get full text
    Article
  14. 10154

    TSHD: Topic Segmentation Based on Headings Detection (Case Study: Resumes) by Majd E. Tannous, Wassim H. Ramadan, Mohanad A. Rajab

    Published 2023-01-01
    “…Due to the increased amount of data, it has become very necessary to manipulate resumes by computer to save time and effort. This research presents a new algorithm named TSHD for topic segmentation based on headings detection. …”
    Get full text
    Article
  15. 10155

    Data privacy preservation for the search of Internet of things based on fine-grained authorization by Jia-hui WANG, Chuan-yi LIU, Bin-xing FANG

    Published 2017-01-01
    “…Finally, the future research work was summarized and pointed out.…”
    Get full text
    Article
  16. 10156

    Review of information hiding on Chinese text by Guohua WU, Lichun GONG, Lifeng YUAN, Ye YAO

    Published 2019-09-01
    “…Text information hiding is an important technology to protect the security and integrity of text content.The research progress of Chinese text information hiding was reviewed.According to the clue of Chinese text information hiding,the existing algorithms were divided into three categories,algorithms based on text images,algorithms based on text format and algorithms based on text content.The implementation process of each type of algorithm was elaborated and the advantages and disadvantages of the algorithm were analyzed.At the same time,their principles,embedded capacity and anti-attack capability was compared and analyzed.In addition,the problems existing in Chinese text information hiding technology was summarized,and the research trends were discussed in the future.It is expected to provide reference for research in this field.…”
    Get full text
    Article
  17. 10157
  18. 10158

    Evaluation of Multi-Class Classification Performance Lung Cancer Through K-NN and SVM Approach by Muh. Indra Endriartono Saputra Troy, Sitti Rahmah Jabir, Siska Anraeni

    Published 2025-04-01
    “…Based on the research and discussion of SVM and KNN performance evaluation, the SVM algorithm produces an accuracy of 98.28%, surpassing the accuracy of the KNN algorithm of 97.25%. …”
    Get full text
    Article
  19. 10159

    The influence of machine learning-based knowledge management model on enterprise organizational capability innovation and industrial development. by Zhigang Zhou, Yanyan Liu, Hao Yu, Lihua Ren

    Published 2020-01-01
    “…First, through the analysis and discussion of ontology-based data mining (OBDM) algorithm and association analysis (Apriori) algorithm, a data mining algorithm (ML-AR algorithm) on account of ontology-based multilayer association and machine learning is proposed. …”
    Get full text
    Article
  20. 10160