Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
agent » agents (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
agent » agents (Expand Search)
-
61
CoLoSSI: Multi-Robot Task Allocation in Spatially-Distributed and Communication Restricted Environments
Published 2024“…We propose a cooperative, load-balancing task allocation and scheduling algorithm based on sequential single-item auctions (CoLoSSI) that explicitly considers the non-atomicity of tasks, promotes synergies between agents, and enables cooperation while maintaining computational tractability. …”
-
62
-
63
-
64
-
65
On Single Source Reachability Improvement
Published 2022“…We show the NP hardness and present an effective polynomial-time greedy algorithm. Experimental evaluation of our greedy algorithm is conducted on randomly generated graphs, using the Erdos-Renyi approach. …”
Get full text
Get full text
Get full text
masterThesis -
66
STEM: spatial speech separation using twin-delayed DDPG reinforcement learning and expectation maximization
Published 2025“…In this paper, a novel speech separation algorithm is proposed that integrates the twin-delayed deep deterministic (TD3) policy gradient reinforcement learning (RL) agent with the expectation maximization (EM) algorithm for clustering the spatial cues of individual sources separated on azimuth. …”
-
67
Recent advances on artificial intelligence and learning techniques in cognitive radio networks
Published 2015“…The literature survey is organized based on different artificial intelligence techniques such as fuzzy logic, genetic algorithms, neural networks, game theory, reinforcement learning, support vector machine, case-based reasoning, entropy, Bayesian, Markov model, multi-agent systems, and artificial bee colony algorithm. …”
Get full text
Get full text
Get full text
Get full text
article -
68
Improving the security of SNMP in wireless networks
Published 2017“…SNMPv1 and v2 do not provide security when managing agents. Three very important security features (authentication, encryption, access control) are added to SNMPv3 under the user-based security model (USM). …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
69
Blood Glucose Regulation Modelling and Intelligent Control
Published 2024Get full text
doctoralThesis -
70
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
Published 2010“…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
Get full text
-
71
A Literature Review on System Dynamics Modeling for Sustainable Management of Water Supply and Demand
Published 2023“…One noticeable finding is that only 12% of the articles used quantitative models to complement SDM for the decision-making process. The models included agent-based modeling (ABM), Bayesian networking (BN), analytical hierarchy approach (AHP), and simulation optimization multi-objective optimization (MOO). …”
-
72
Modeling and Bias-Robust Estimation of the Acoustic Release of Chemotherapeutics from Liposomes
Published 2019“…Optimality is guaranteed by accurately identifying the underlying statistical noise characteristics in experimental data. The estimator also quantifies the bias in the release, exhibited by the experimental data. …”
Get full text
article -
73
A PLC based power factor controller for a 3-phase induction motor
Published 2000“…Experimental studies have been carried-out for verifying the operation performance of the proposed PFC under different operating conditions. …”
Get full text
Get full text
article -
74
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
75
-
76
Efficient Seismic Volume Compression using the Lifting Scheme
Published 2000“…Finally a runlength plus a Huffman encoding are applied for binary coding of the quantized coefficients.…”
Get full text
article -
77
Clustering records in information retrieval systems. (c1995)
Published 1995Get full text
Get full text
masterThesis -
78
Localization of Damages in Plain And Riveted Aluminium Specimens using Lamb Waves
Published 2018“…The TOA data of the wave reflected from the damage is used in the two arrival time difference and astroid algorithms to locate the damage in an enclosed area. …”
Get full text
-
79
Developing a Cooperative Behavior for Multi Agents System Application to Robot Soccer
Published 2007Get full text
doctoralThesis -
80
Multigrid solvers in reconfigurable hardware. (c2006)
Published 2006Get full text
Get full text
masterThesis