-
3341
Chebyshev approximation of discrete polynomials and splines
Published 2004“…The efficiency of each algorithm developed is evaluated on the basis of the number of iterations and extreme points required for convergence, and the magnitude of the errors generated. …”
Get full text
Get full text
Get full text
Thesis -
3342
Chebyshev approximation of discrete polynomials and splines
Published 2004“…The efficiency of each algorithm developed is evaluated on the basis of the number of iterations and extreme points required for convergence, and the magnitude of the errors generated. …”
Get full text
Get full text
Get full text
Thesis -
3343
Energy-Efficient Federated Learning With Resource Allocation for Green IoT Edge Intelligence in B5G
Published 2023“…The remaining computational frequency allocation, transmission power allocation, and loss could be resolved with an Alternative Direction Algorithm (ADA) to reduce energy consumption and complexity at every iteration of FL time from IoT devices to edge intelligence nodes. …”
Get full text
Article -
3344
Some numerical methods for temperature and mass transfer simulation on the dehydration of herbs
Published 2010“…The performance analyses of Numerical methods are presented in terms of execution time, computational complexity, number of iterations, errors, accuracy and convergence rate.…”
Article -
3345
Presentation-Based Learning and Peer Evaluation to Enhance Active Learning and Self-Confidence in the Financial Management Classroom
Published 2018“…Purpose – The purpose of this study was to identify an effective learning strategy for students to engage authentically in their learning process.This study also aimed to introduce an innovative active learning approach to enhance students’ involvement and to strengthen self-confidence throughout their learning in the Financial Management classroom.The approach involved the adoption of structured and accountable presentation-based learning activities.Methodology – This study used action research design involving an iterative process of self-reflective cycles: planning, acting, observing and reflecting. …”
Get full text
Article -
3346
Evaluating the effectiveness of Scoring Rubrics Assisted Reading (SRAR) technique in the reading of software requirements work documents
Published 2017“…The method used is as follows: the use of SRAR, detection of defects, counting of defects present in the artifacts and refining of the artifact for each round/iteration of review. The defects found by reviewers were counted and presented as averages and percentages. …”
Get full text
Article -
3347
Balancing exploration and exploitation in ACS algorithms for data clustering
Published 2019“…The ACOC performs clustering based on random initial centroids, which are generated iteratively during the algorithm run. This makes the algorithm deviate from the clustering solution and performs a biased exploration. …”
Get full text
Article -
3348
Approximate Analytical Methods in Double Parametric Form Of Fuzzy Numbers for Solving Fuzzy Partial Differential Equations (S/O 14188)
Published 2021“…Therefore, this study has developed new approximate analytical methods in double parametric form of fuzzy numbers based on the original crisp Homotopy Perturbation Method, Variational Iteration Method, Homotopy Analysis Method and Optimal Homotopy Asymptotic Method to solve FPDEs involving fuzzy heat equation, fuzzy reaction-diffusion equation and fuzzy wave equation. …”
Get full text
Monograph -
3349
CMF-iteMS: An automatic threshold selection for detection of copy-move forgery
Published 2019“…The CMF-iteMS recommends a PatchMatch-based CMF detection method that adapts Fourier-Mellin Transform (FMT) as the feature extraction technique while a new automatic threshold selection based on iterative means of regions size (iteMS) procedure is introduced to have flexibility in changing the threshold value for various characteristics (quality, sizes, and attacks) in each input image. …”
Get full text
Article -
3350
Support directional shifting vector: A direction based machine learning classifier
Published 2021“…The positional error of the linear function has been modelled as a loss function which is iteratively optimized using the gradient descent algorithm. …”
Get full text
Article -
3351
Breast cancer disease classification using fuzzy-ID3 algorithm based on association function
Published 2022“…The FID3-AF algorithm is a hybridisation of the fuzzy system, the iterative dichotomizer 3 (ID3) algorithm, and the association function. …”
Get full text
Article -
3352
Optimization of two-sided assembly line balancing with resource constraints using modified particle swarm optimisation
Published 2022“…The good performance of MPSO was attributed to its ability to maintain particle diversity over iterations. The proposed 2S-ALB model and MPSO algorithm were validated later using an industrial case study. …”
Get full text
Get full text
Article -
3353
Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm decision tree classifier
Published 2011“…Network security has gained significant attention in research and industrial communities.Due to the increasing threat of the network intrusion,firewalls have become important elements of the security policy.Firewall performance highly depends toward number of rules,because the large more rules the consequence makes downhill performance progressively.Firewall can be allow or deny access network packets incoming and outgoing into Local Area Network(LAN),but firewall can not detect intrusion.To distinguishing an intrusion network packet or normal is very difficult and takes a lot of time.An analyst must review all the network traffics previously.In this study,a new way to make the rules that can determine network packet is intrusion or normal automatically.These rules implemented into firewall as prevention,which if there is a network packet that match these rules then network packet will be dropped.This is called Network Intrusion Prevention System(NIPS).These rules are generated based on Network Intrusion Detection System(NIDS)and Iterative Dichotomiser 3 (ID3)Algorithm Decision Tree Classifier,which as data training is intrusion network packet and normal network packets from previous network traffics.The experiment is successful,which can generate the rules then implemented into a firewall and drop the intrusion network packet automatically.Moreover,this way can minimize number of rules in firewall.…”
Get full text
Thesis -
3354
AN EMPIRICAL METHOD FOR IMPROVING THE QUALITY OF RXTE HEXTE SPECTRA
Published 2016“…Starting with the residual spectrum for Cluster B, via an iterative procedure we created the calibration tool hexBcorr for correcting any Cluster B spectrum of interest. …”
Get full text
Get full text
Article -
3355
Lagrangian duality in 3D SLAM: Verification techniques and optimal solutions
Published 2017“…State-of-the-art techniques for simultaneous localization and mapping (SLAM) employ iterative nonlinear optimization methods to compute an estimate for robot poses. …”
Get full text
Get full text
Get full text
Article -
3356
Validation of full-wave simulations for mode conversion of waves in the ion cyclotron range of frequencies with phase contrast imaging in Alcator C-Mod
Published 2017“…For the minority heating cases, self-consistent electric fields and a minority ion distribution function were simulated by iterating a full-wave code and a Fokker-Planck code. …”
Get full text
Get full text
Get full text
Get full text
Article -
3357
Multistage Robust Mixed-Integer Optimization with Adaptive Partitions
Published 2017“…The method repeats this process iteratively to further improve the objective until a desired gap is reached. …”
Get full text
Get full text
Get full text
Article -
3358
Multi-atlas and label fusion approach for patient-specific MRI based skull estimation
Published 2017“…We have compared Majority Voting, Simultaneous Truth and Performance Level Estimation (STAPLE), Shape Based Averaging (SBA), and the Selective and Iterative Method for Performance Level Estimation (SIMPLE) algorithms. …”
Get full text
Get full text
Article -
3359
Fast reconstruction for multichannel compressed sensing using a hierarchically semiseparable solver
Published 2017“…As an alternative to iterative methods that repetitively evaluate a forward CS+SENSE model, we introduce a technique for the fast computation of a compact inverse model solution. …”
Get full text
Get full text
Article -
3360
Depression as a systemic syndrome: mapping the feedback loops of major depressive disorder
Published 2017“…We assessed the strength of empirical support for each mechanism and prioritized those with support from validation studies. Through an iterative process, we synthesized the empirical literature and created a conceptual model of major depressive disorder. …”
Get full text
Get full text
Article