Results for ' Optimization Techniques '

964 found
Order:
  1.  47
    OPTIMIZATION TECHNIQUES FOR LOAD BALANCING IN DATA-INTENSIVE APPLICATIONS USING MULTIPATH ROUTING NETWORKS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  45
    ENHANCED SLA-DRIVEN LOAD BALANCING ALGORITHMS FOR DATA CENTER OPTIMIZATION USING ADVANCED OPTIMIZATION TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):369-376.
    In modern data centers, managing the distribution of workloads efficiently is crucial for ensuring optimal performance and meeting Service Level Agreements (SLAs). Load balancing algorithms play a vital role in this process by distributing workloads across computing resources to avoid overloading any single resource. However, the effectiveness of these algorithms can be significantly enhanced through the integration of advanced optimization techniques. This paper proposes an SLA-driven load balancing algorithm optimized using methods such as genetic algorithms, particle swarm (...), and simulated annealing. By focusing on both resource utilization and SLA compliance, the proposed approach aims to reduce latency, improve throughput, and maximize overall system efficiency. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  3. A Review on Resource Provisioning Algorithms Optimization Techniques in Cloud Computing.M. R. Sumalatha & M. Anbarasi - 2019 - International Journal of Electrical and Computer Engineering 9 (1).
    Cloud computing is the provision of IT resources (IaaS) on-demand using a pay as you go model over the internet. It is a broad and deep platform that helps customers builds sophisticated, scalable applications. To get the full benefits, research on a wide range of topics is needed. While resource over provisioning can cost users more than necessary, resource under provisioning hurts the application performance. The cost effectiveness of cloud computing highly depends on how well the customer can optimize the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  31
    Optimization Algorithms for Load Balancing in Data-Intensive Systems with Multipath Routing.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    : In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  32
    OPTIMIZED CYBERBULLYING DETECTION IN SOCIAL MEDIA USING SUPERVISED MACHINE LEARNING AND NLP TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-435.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  41
    Multipath Routing Optimization for Enhanced Load Balancing in Data-Heavy Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Global Optimization Studies on the 1-D Phase Problem.Jim Marsh, Martin Zwick & Byrne Lovell - 1996 - Int. J. Of General Systems 25 (1):47-59.
    The Genetic Algorithm (GA) and Simulated Annealing (SA), two techniques for global optimization, were applied to a reduced (simplified) form of the phase problem (RPP) in computational crystallography. Results were compared with those of "enhanced pair flipping" (EPF), a more elaborate problem-specific algorithm incorporating local and global searches. Not surprisingly, EPF did better than the GA or SA approaches, but the existence of GA and SA techniques more advanced than those used in this study suggest that these (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  38
    Innovative Approaches in Cardiovascular Disease Prediction Through Machine Learning Optimization.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    Cardiovascular diseases (CVD) represent a significant cause of morbidity and mortality worldwide, necessitating early detection for effective intervention. This research explores the application of machine learning (ML) algorithms in predicting cardiovascular diseases with enhanced accuracy by integrating optimization techniques. By leveraging data-driven approaches, ML models can analyze vast datasets, identifying patterns and risk factors that traditional methods might overlook. This study focuses on implementing various ML algorithms, such as Decision Trees, Random Forest, Support Vector Machines, and Neural Networks, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  43
    OPTIMIZED DRIVER DROWSINESS DETECTION USING MACHINE LEARNING TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):395-400.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  37
    OPTIMIZED INTRUSION DETECTION MODEL FOR IDENTIFYING KNOWN AND INNOVATIVE CYBER ATTACKS USING SUPPORT VECTOR MACHINE (SVM) ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-404.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge data (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  12. Intentional Sampling by Goal Optimization with Decoupling by Stochastic Perturbation.Julio Michael Stern, Marcelo de Souza Lauretto, Fabio Nakano & Carlos Alberto de Braganca Pereira - 2012 - AIP Conference Proceedings 1490:189-201.
    Intentional sampling methods are non-probabilistic procedures that select a group of individuals for a sample with the purpose of meeting specific prescribed criteria. Intentional sampling methods are intended for exploratory research or pilot studies where tight budget constraints preclude the use of traditional randomized representative sampling. The possibility of subsequently generalize statistically from such deterministic samples to the general population has been the issue of long standing arguments and debates. Nevertheless, the intentional sampling techniques developed in this paper explore (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  28
    OPTIMIZING CONSUMER BEHAVIOUR ANALYTICS THROUGH ADVANCED MACHINE LEARNING ALGORITHMS.Yoheswari S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):362-370.
    Consumer behavior analytics has become a pivotal aspect for businesses to understand and predict customer preferences and actions. The advent of machine learning (ML) algorithms has revolutionized this field by providing sophisticated tools for data analysis, enabling businesses to make data-driven decisions. However, the effectiveness of these ML algorithms significantly hinges on the optimization techniques employed, which can enhance model accuracy and efficiency. This paper explores the application of various optimization techniques in consumer behaviour analytics using (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  49
    SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Multitask Music-Based Therapy Optimization in Aging Neurorehability by Activation of the Informational Cognitive Centers of Consciousness.Florin Gaiseanu - 2020 - Gerontology and Geriatric Studies 6 (3):1-5.
    The rapid increase of the old age people imposes the reconsideration of the rehabilitation techniques and procedures and/or the development of the existing ones, at least from two points of view: the limitation use of the pharmaceutical drugs because of their secondary effects in the debilitated organisms and their avoidance; the high risk of the induced anxiety states, depression or other symptoms as a consequence of the main disease, i.e. the neuro-degenerative or mobility dysfunctions, limiting again the use of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  16.  45
    OPTIMIZING CONSUMER BEHAVIOUR ANALYTICS THROUGH ADVANCED MACHINE LEARNING ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):360-368.
    Consumer behavior analytics has become a pivotal aspect for businesses to understand and predict customer preferences and actions. The advent of machine learning (ML) algorithms has revolutionized this field by providing sophisticated tools for data analysis, enabling businesses to make data-driven decisions. However, the effectiveness of these ML algorithms significantly hinges on the optimization techniques employed, which can enhance model accuracy and efficiency. This paper explores the application of various optimization techniques in consumer behaviour analytics using (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  38
    Automated Cyberbullying Detection Framework Using NLP and Supervised Machine Learning Models.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-432.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  42
    Transforming Consumer Behavior Analysis with Cutting-Edge Machine Learning.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):360-368.
    The research outlines a workflow that incorporates data collection, preprocessing, model training, and optimization. Real-world datasets from retail and e-commerce sectors are utilized to validate the proposed methodology, showcasing substantial improvements in model performance. The results indicate that optimized models not only provide better predictions of consumer behaviour but also enhance customer segmentation and targeting strategies. The study concludes with recommendations for future research, including the exploration of hybrid optimization techniques and the application of these methods in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  30
    Machine Learning-Based Cyberbullying Detection System with Enhanced Accuracy and Speed.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-429.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  56
    OPTIMIZED SECURE CLOUD STORAGE USING ATTRIBUTE-BASED KEYWORD SEARCH.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):338-349.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  32
    Optimizing Data Center Operations with Enhanced SLA-Driven Load Balancing".S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):368-376.
    The research introduces a novel framework that incorporates real-time monitoring, dynamic resource allocation, and adaptive threshold settings to ensure consistent SLA adherence while optimizing computing performance. Extensive simulations are conducted using synthetic and real-world datasets to evaluate the performance of the proposed algorithm. The results demonstrate that the optimized load balancing approach outperforms traditional algorithms in terms of SLA compliance, resource utilization, and energy efficiency. The findings suggest that the integration of optimization techniques into load balancing algorithms can (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  42
    OPTIMIZED CARDIOVASCULAR DISEASE PREDICTION USING MACHINE LEARNING ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    Cardiovascular diseases (CVD) represent a significant cause of morbidity and mortality worldwide, necessitating early detection for effective intervention. This research explores the application of machine learning (ML) algorithms in predicting cardiovascular diseases with enhanced accuracy by integrating optimization techniques. By leveraging data-driven approaches, ML models can analyze vast datasets, identifying patterns and risk factors that traditional methods might overlook. This study focuses on implementing various ML algorithms, such as Decision Trees, Random Forest, Support Vector Machines, and Neural Networks, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23.  41
    Intelligent Driver Drowsiness Detection System Using Optimized Machine Learning Models.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-405.
    : Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  41
    Efficient Data Center Management: Advanced SLA-Driven Load Balancing Solutions.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):368-376.
    In modern data centers, managing the distribution of workloads efficiently is crucial for ensuring optimal performance and meeting Service Level Agreements (SLAs). Load balancing algorithms play a vital role in this process by distributing workloads across computing resources to avoid overloading any single resource. However, the effectiveness of these algorithms can be significantly enhanced through the integration of advanced optimization techniques. This paper proposes an SLA-driven load balancing algorithm optimized using methods such as genetic algorithms, particle swarm (...), and simulated annealing. By focusing on both resource utilization and SLA compliance, the proposed approach aims to reduce latency, improve throughput, and maximize overall system efficiency. The research introduces a novel framework that incorporates real-time monitoring, dynamic resource allocation, and adaptive threshold settings to ensure consistent SLA adherence while optimizing computing performance. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  37
    Advanced Driver Drowsiness Detection Model Using Optimized Machine Learning Algorithms.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):396-402.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26.  51
    Advanced Attribute-Based Keyword Search for Secure Cloud Data Storage Solutions.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-360.
    This paper delves into the integration of optimization techniques within ABKS to enhance search efficiency and data security in cloud storage environments. We explore various optimization strategies, such as index compression, query processing enhancement, and encryption optimization, which aim to reduce computational overhead while maintaining robust security measures. Through a comprehensive analysis, the paper illustrates how these techniques can significantly improve the performance of cloud storage systems, ensuring both security and usability. Experimental results demonstrate that (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  26
    OPTIMIZED CLOUD SECURE STORAGE: A FRAMEWORK FOR DATA ENCRYPTION, DECRYPTION, AND DISPERSION.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-426.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  29
    OPTIMIZED ENCRYPTION PROTOCOL FOR LIGHTWEIGHT AND SEARCHABLE DATA IN IOT ENVIRONMENTS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):408-414.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Content marketing model for leading web content management.Igor Britchenko, Iryna Diachuk & Maksym Bezpartochnyi - 2019 - Atlantis Press 318:119-126.
    This paper is envisaged to provide the Ukrainian businesses with suggestions for a content marketing model for the effective management of website content in order to ensure its leading position on the European and world markets. Our study employed qualitative data collection with semi-structured interviews, survey, observation methods, quantitative and qualitative methods of content analysis of regional B2B companies, as well as the comparative analysis. The following essential stages of the content marketing process as preliminary search and analysis, website content (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  30.  31
    Scalable Encryption Protocol for Searchable Data Management in IoT Systems.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31.  27
    Efficient Cryptographic Methods for Secure Searchable Data in IoT Frameworks.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32.  27
    Enhanced Secure Cloud Storage: An Integrated Framework for Data Encryption and Distribution.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):416-427.
    Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no single server holds the complete dataset. Decryption occurs only when the dispersed data fragments are reassembled, which adds (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  24
    Cloud-Based Secure Storage: A Framework for Efficient Encryption, Decryption, and Data Dispersion.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):427-434.
    The exponential growth of cloud storage has necessitated advanced security measures to protect sensitive data from unauthorized access. Traditional encryption methods provide a layer of security, but they often lack the robustness needed to address emerging threats. This paper introduces an optimized framework for secure cloud storage that integrates data encryption, decryption, and dispersion using cutting-edge optimization techniques. The proposed model enhances data security by first encrypting the data, then dispersing it across multiple cloud servers, ensuring that no (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. OPTIMIZING DATA SCIENCE WORKFLOWS IN CLOUD COMPUTING.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 4 (1):71-76.
    This paper explores the challenges and innovations in optimizing data science workflows within cloud computing environments. It begins by highlighting the critical role of data science in modern industries and the pivotal contribution of cloud computing in enabling scalable and efficient data processing. The primary focus lies in identifying and analyzing the key challenges encountered in current data science workflows deployed in cloud infrastructures. These challenges include scalability issues related to handling large volumes of data, resource management complexities in optimizing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Predicting Player Power In Fortnite Using Just Nueral Network.Al Fleet Muhannad Jamal Farhan & Samy S. Abu-Naser - 2023 - International Journal of Engineering and Information Systems (IJEAIS) 7 (9):29-37.
    Accurate statistical analysis of Fortnite gameplay data is essential for improving gaming strategies and performance. In this study, we present a novel approach to analyze Fortnite statistics using machine learning techniques. Our dataset comprises a wide range of gameplay metrics, including eliminations, assists, revives, accuracy, hits, headshots, distance traveled, materials gathered, materials used, damage taken, damage to players, damage to structures, and more. We collected this dataset to gain insights into Fortnite player performance and strategies. The proposed model employs (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  36. AI-Completeness: Using Deep Learning to Eliminate the Human Factor.Kristina Šekrst - 2020 - In Sandro Skansi (ed.), Guide to Deep Learning Basics. Springer. pp. 117-130.
    Computational complexity is a discipline of computer science and mathematics which classifies computational problems depending on their inherent difficulty, i.e. categorizes algorithms according to their performance, and relates these classes to each other. P problems are a class of computational problems that can be solved in polynomial time using a deterministic Turing machine while solutions to NP problems can be verified in polynomial time, but we still do not know whether they can be solved in polynomial time as well. A (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. A conceptual framework for data-driven sustainable finance in green energy transition.Omotayo Bukola Adeoye, Ani Emmanuel Chigozie, Ninduwesuor-Ehiobu Nwakamma, Jose Montero Danny, Favour Oluwadamilare Usman & Kehinde Andrew Olu-Lawal - 2024 - World Journal of Advanced Research and Reviews 21 (2):1791–1801.
    As the world grapples with the urgent need for sustainable development, the transition towards green energy stands as a critical imperative. Financing this transition poses significant challenges, requiring innovative approaches that align financial objectives with environmental sustainability goals. This review presents a conceptual framework for leveraging data-driven techniques in sustainable finance to facilitate the transition towards green energy. The proposed framework integrates principles of sustainable finance with advanced data analytics to enhance decision-making processes across the financial ecosystem. At its (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Synthetic Biology and Biofuels.Catherine Kendig - 2012 - In Paul B. Thompson & David M. Kaplan (eds.), Encyclopedia of Food and Agricultural Ethics. New York: Springer Verlag.
    Synthetic biology is a field of research that concentrates on the design, construction, and modification of new biomolecular parts and metabolic pathways using engineering techniques and computational models. By employing knowledge of operational pathways from engineering and mathematics such as circuits, oscillators, and digital logic gates, it uses these to understand, model, rewire, and reprogram biological networks and modules. Standard biological parts with known functions are catalogued in a number of registries (e.g. Massachusetts Institute of Technology Registry of Standard (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  39. Environmental Impact of Sustainability Dispersion of Chlorine Releases in Coastal Zone of Alexandra: Spatial-Ecological Modeling.Mohammed El Raey & Moustafa Osman Mohammed - 2024 - International Journal of Environmental and Ecological Engineering 18 (1):21-28.
    The spatial-ecological modeling is relating sustainable dispersions with social development. Sustainability with spatial-ecological model gives attention to urban environments in the design review management to comply with Earth’s system. Naturally exchanged patterns of ecosystems have consistent and periodic cycles to preserve energy flows and materials in Earth’s system. The Probabilistic Risk Assessment (PRA) technique is utilized to assess the safety of an industrial complex. The other analytical approach is the Failure-Safe Mode and Effect Analysis (FMEA) for critical components. The plant (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Numerical infinities applied for studying Riemann series theorem and Ramanujan summation.Yaroslav Sergeyev - 2018 - In AIP Conference Proceedings 1978. AIP. pp. 020004.
    A computational methodology called Grossone Infinity Computing introduced with the intention to allow one to work with infinities and infinitesimals numerically has been applied recently to a number of problems in numerical mathematics (optimization, numerical differentiation, numerical algorithms for solving ODEs, etc.). The possibility to use a specially developed computational device called the Infinity Computer (patented in USA and EU) for working with infinite and infinitesimal numbers numerically gives an additional advantage to this approach in comparison with traditional methodologies (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  41. Energy analysis for construction of a zero-energy residential building using thermal simulation in Iran.Nima Amani, Abdulamir Rezasoroush, Mostafa Moghadas Mashhad & Keyvan Safarzadeh - 2021 - International Journal of Energy Sector Management (Ijesm) 15 (5):895-913.
    Purpose: The purpose of this paper is to examine the feasibility and design of zero-energy buildings (ZEBs) in cold and semi-arid climates. In this study, to maximize the use of renewable energy, energy consumption is diminished using passive solar architecture systems and techniques. -/- Design/methodology/approach: The case study is a residential building with a floor area of 100 m2 and four inhabitants in the cold and semi-arid climate, northeast of Iran. For thermal simulation, the climate data such as air (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Optimisation of mixed proportion for cement brick containing plastic waste using response surface methodology (RSM).Chuck Chuan Ng - 2022 - Innovative Infrastructure Solutions 7.
    Plastic waste is a significant environmental problem for almost all countries; therefore, protecting the environment from the problem is crucial. The most sensible solution to these problems is substituting the natural aggregates with substantial plastic waste in various building materials. This study aimed to optimise the mixed design ratio of cement brick containing plastic waste as aggregate replacement. Plastic cement brick mixtures were prepared by the incorporation of four different types of plastic waste such as polyethylene terephthalate (PET), high-density polyethylene, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Referent tracking for treatment optimisation in schizophrenic patients.Werner Ceusters & Barry Smith - 2006 - Journal of Web Semantics 4 (3):229-236.
    The IPAP Schizophrenia Algorithm was originally designed in the form of a flow chart to help physicians optimise the treatment of schizophrenic patients. We examined the current version from the perspective of recent work on terminologies and ontologies thereby drawing on the resources of Basic Formal Ontology, and this with the objective to make the algorithm appropriate for Semantic Web applications. We found that Basic Formal Ontology is a rich enough theory to represent all the entities involved and that applying (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  44. (1 other version)Does optimization imply rationality?Philippe Mongin - 2000 - Synthese 124 (1-2):73 - 111.
    The relations between rationality and optimization have been widely discussed in the wake of Herbert Simon's work, with the common conclusion that the rationality concept does not imply the optimization principle. The paper is partly concerned with adding evidence for this view, but its main, more challenging objective is to question the converse implication from optimization to rationality, which is accepted even by bounded rationality theorists. We discuss three topics in succession: (1) rationally defensible cyclical choices, (2) (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  45. Optimization Models for Reaction Networks: Information Divergence, Quadratic Programming and Kirchhoff’s Laws.Julio Michael Stern - 2014 - Axioms 109:109-118.
    This article presents a simple derivation of optimization models for reaction networks leading to a generalized form of the mass-action law, and compares the formal structure of Minimum Information Divergence, Quadratic Programming and Kirchhoff type network models. These optimization models are used in related articles to develop and illustrate the operation of ontology alignment algorithms and to discuss closely connected issues concerning the epistemological and statistical significance of sharp or precise hypotheses in empirical science.
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  46. Economic rationality and the optimization trap.Nikil Mukerji & Julian Nida-Rümelin - 2015 - St. Gallen Business Review 2015 (1):12-17.
    The theme of this issue of the St. Gallen Business Review is "Harmony". For this reason, we would like to discuss whether two aspects of our life- world are in harmony, namely economic optimization and morality. What is the relation between them? According to a widely shared view, which is one aspect of the doctrine of "mainstream economics", the functioning of an economic system does not require moral behaviour on the part of the individual economic agent. In what follows, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Combining Optimization and Randomization Approaches for the Design of Clinical Trials.Julio Michael Stern, Victor Fossaluza, Marcelo de Souza Lauretto & Carlos Alberto de Braganca Pereira - 2015 - Springer Proceedings in Mathematics and Statistics 118:173-184.
    t Intentional sampling methods are non-randomized procedures that select a group of individuals for a sample with the purpose of meeting specific prescribed criteria. In this paper we extend previous works related to intentional sampling, and address the problem of sequential allocation for clinical trials with few patients. Roughly speaking, patients are enrolled sequentially, according to the order in which they start the treatment at the clinic or hospital. The allocation problem consists in assigning each new patient to one, and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. Optimization and Beyond.Akshath Jitendranath - 2024 - Journal of Philosophy 121 (3):121-146.
    This paper will be concerned with hard choices—that is, choice situations where an agent cannot make a rationally justified choice. Specifically, this paper asks: if an agent cannot optimize in a given situation, are they facing a hard choice? A pair of claims are defended in light of this question. First, situations where an agent cannot optimize because of incompleteness of the binary preference or value relation constitute a hard choice. Second, situations where agents cannot optimize because the binary preference (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49.  31
    Machine Learning-Driven Optimization for Accurate Cardiovascular Disease Prediction.Yoheswari S. - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    The research methodology involves data preprocessing, feature engineering, model training, and performance evaluation. We employ optimization methods such as Genetic Algorithms and Grid Search to fine-tune model parameters, ensuring robust and generalizable models. The dataset used includes patient medical records, with features like age, blood pressure, cholesterol levels, and lifestyle habits serving as inputs for the ML models. Evaluation metrics, including accuracy, precision, recall, F1-score, and the area under the ROC curve (AUC-ROC), assess the model's predictive power.
    Download  
     
    Export citation  
     
    Bookmark  
  50. Optimization of commodity stocks enterprise by means of HML-FRM clustering.Igor Britchenko & Maksym Bezpartochnyi - 2020 - Financial and Credit Activity: Problems of Theory and Practice 3 (34(2020)):259-269.
    The article examines the process of formation inventory of the enterprise and determines the optimal volume of commodity resources for sale. A generalization of author’s approaches to the formation and evaluation of inventories of the enterprise is carried out. The marketing-logistic approach was applied for the purpose of distribution groups of commodity resources due to the risk of non-fulfillment the order for the supply of goods of the enterprise. In order to ensure an effective process of commodity provision of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 964