Search alternatives:
scale technologies » storage technologies (Expand Search), enabled technologies (Expand Search)
algorithm scale » algorithm sma (Expand Search), algorithm survey (Expand Search)
scale technologies » storage technologies (Expand Search), enabled technologies (Expand Search)
algorithm scale » algorithm sma (Expand Search), algorithm survey (Expand Search)
-
1
An Effective Hash Based Assessment and Recovery Algorithm for Healthcare Systems
Published 2019“…Hence, this highlights the need for an algorithm that is capable of assessing the widespread damage scale before starting the repair of the inconsistent medical database. …”
Get full text
Get full text
Get full text
masterThesis -
2
Multi-Objective Co-optimization of Power and Gas under Uncertainties with P2H embedded
Published 2022Get full text
doctoralThesis -
3
-
4
Solar power forecasting beneath diverse weather conditions using GD and LM-artificial neural networks
Published 2023“…Large-scale solar energy production is still a great deal of obstruction due to the unpredictability of solar power. …”
Get full text
-
5
Customs Trade Facilitation and Compliance for Ecommerce using Blockchain and Data Mining
Published 2021“…Additionally, the Cross Industry Standard Process for Data Mining (CRISP-DM) methodology is employed for modelling the two proposed clustering algorithms to identify transactional risks. The usability of the proposed framework is evaluated using the System Usability Scale (SUS) resulting in overall high acceptability levels across all users. …”
Get full text
-
6
-
7
-
8
Navigating the Landscape of Deep Reinforcement Learning for Power System Stability Control: A Review
Published 2023“…For all methods outlined, a discussion on their bottlenecks, research challenges, and potential opportunities in large-scale PSS is also presented. This review aims to support research in this area of DRL algorithms to embrace PSS against unseen faults and different PS topologies.…”
-
9
-
10
UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices
Published 2019“…To solve it, we first propose the high-complexity branch, reduce and bound (BRB) algorithm to find the global optimal solution for relatively small scale scenarios. …”
Get full text
Get full text
Get full text
Get full text
article -
11
Advancing Data Center Networks: A Focus on Energy and Cost Efficiency
Published 2023“…One area of ongoing research in data center networking focuses on innovating new topologies for large-scale node connectivity. These topologies must incorporate fault-tolerant and efficient routing algorithms. …”
-
12
The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions
Published 2022“…Then, we provide a comprehensive review of the most widely used DRL algorithms to address RRAM problems, including the value- and policy-based algorithms. …”
-
13
Convergence of Photovoltaic Power Forecasting and Deep Learning: State-of-Art Review
Published 2021“…In addition, this review analyzes recent automatic architecture optimization algorithms for DL-based PVPF. Next, the notable DL technologies are thoroughly described. …”
-
14
A geographic information system method to generate long term regional solar radiation resource maps: enhancing decision-making
Published 2024“…The regression-kriging algorithm and its variants are used to calibrate satellite data, through interpolation of ground solar radiation data. …”
-
15
XBeGene: Scalable XML Documents Generator by Example Based on Real Data
Published 2012Get full text
Get full text
Get full text
Get full text
conferenceObject -
16
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
Published 2022“…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. In this paper, we proposed a novel technique in steganography within the digital images such is RGB, Gray Scale, Texture, Aerial images to achieve higher security, imperceptibility, capacity, and robustness as compared with existing methods. …”
-
17
Teachers' Perceptions of the Role of Artificial Intelligence in Facilitating Inclusive Practices for Students with Special Educational Needs and Disabilities: A Case Study in a Pri...
Published 2025“…Findings referred these barriers to limited teacher training, technological accessibility, and data privacy concerns, as well as ethical biases in AI algorithms. …”
Get full text
-
18
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
Published 2021“…The optimization phase improved the conceptual framework by adding three new fundamental concepts: hubs coupling, encrypted transmission, and end-to-end service quality. The technology stack was also enhanced with three new algorithms and five protocols. …”
Get full text
-
19
A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis
Published 2021“…Specifically, we used a clustering algorithm to group published articles based on the similarity of their abstracts to identify research hotspots and current research directions. …”