Search alternatives:
using algorithm » cosine algorithm (Expand Search)
deer algorithm » search algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search)
models using » model using (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
Showing 681 - 700 results of 740 for search '(((( complement deer algorithm ) OR ( elements data algorithm ))) OR ( models using algorithm ))', query time: 0.12s Refine Results
  1. 681
  2. 682
  3. 683

    From low-cost sensors to high-quality data: A summary of challenges and best practices for effectively calibrating low-cost particulate matter mass sensors by Michael R. Giordano (9976173)

    Published 2021
    “…The methods for correcting and calibrating these biases and dependencies that have been used in the literature likewise range from simple linear and quadratic models to complex machine learning algorithms. …”
  4. 684

    YOLO-SAIL: Attention-Enhanced YOLOv5 With Optimized Bi-FPN for Ship Target Detection in SAR Images by Prabu Selvam (22330264)

    Published 2025
    “…<p dir="ltr">Synthetic Aperture Radar (SAR) is useful for monitoring sea surfaces and detecting targets on ships. …”
  5. 685

    Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review by Yasir Ali (799969)

    Published 2023
    “…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …”
  6. 686
  7. 687

    Capillary trapping in mixed-wet porous media: Implications for subsurface carbon dioxide sequestration by Saideep Pavuluri (21792941)

    Published 2025
    “…Insights from this study can be used for improving pore network models and training machine learning algorithms.…”
  8. 688

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices by Neder Karmous (19743430)

    Published 2024
    “…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …”
  9. 689

    An intelligent approach to predicting the effect of nanoparticle mixture ratio, concentration and temperature on thermal conductivity of hybrid nanofluids by Ifeoluwa Wole-Osho (14151315)

    Published 2020
    “…A polynomial correlation model, the adaptive neuro-fuzzy inference system model and an artificial neural network model optimised with three different learning algorithms. …”
  10. 690
  11. 691

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone by Saeed Ullah Jan (9079260)

    Published 2021
    “…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…”
  12. 692

    A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem by Habchi, Wassim

    Published 2008
    “…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …”
    Get full text
    Get full text
    Get full text
    article
  13. 693

    Adaptive Federated Learning Architecture To Mitigate Non-IID Through Multi-Objective GA-Based Efficient Client Selection by Ajaj, Mohamad

    Published 2024
    “…Existing solutions still have several constraints leading to suboptimal model performance and slow convergence. In this paper, we propose a novel approach that incorporates genetic algorithms with an enhanced client selection strategy, utilizing client metadata rather than raw data. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  14. 694

    Single-channel speech denoising by masking the colored spectrograms by Sania Gul (18272227)

    Published 2025
    “…The results show that with masking-based targets, the colored spectrograms provide an improvement of 0.12 points in perceptual evaluation of speech quality (PESQ) score, 4 % in short time objective intelligibility (STOI), and a 163 times reduction in network learnable parameters, as compared to when they are processed by a mapping-based model using pix2pix generative adversarial network (GAN) followed by a feedforward regression neural network. …”
  15. 695

    Dynamic multiple node failure recovery in distributed storage systems by Itani, May

    Published 2018
    “…The contribution of this paper is four-fold: i. we generate an optimized block distribution scheme that minimizes the total system repair cost of all dependent and independent multiple node failure scenarios; ii. we address the practical scenario of having newly arriving blocks and allocate those blocks to existing nodes without any modification to the original on-node block distribution; iii. we consider new-comer nodes and generate an updated optimized block distribution; iv. we consider optimized storage and recovery of blocks with varying priority using variable fractional repetition codes. The four problems are modeled using incidence matrices and solved heuristically. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  16. 696

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates by Ratiba F. Ghachi (14152455)

    Published 2022
    “…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …”
  17. 697

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures by JUMA, MAZEN GHAZI

    Published 2021
    “…The technology stack of the proposed solution was also implemented with four algorithms and eight protocols. The evaluation results of the proposed solution were compared to the results of standard solutions under different cyberattack scenarios using quantitative research methods involving computing simulations, emulation experiments, and analytical modeling. …”
    Get full text
  18. 698

    Predicting Cardiovascular Disease in Patients with Machine Learning and Feature Engineering Techniques by Tyagi, Sapna

    Published 2022
    “…As a result, the research proposes a model for predicting the likelihood of heart disease incidence using logistic regression capabilities.…”
    Get full text
    Get full text
  19. 699

    Software defect prediction. (c2019) by Moussa, Rebecca

    Published 2019
    “…One that focuses on predicting defect in software modules using a hybrid heuristic - a combination of Particle Swarm Optimization (PSO) and Genetic Algorithms (GA). …”
    Get full text
    Get full text
    Get full text
    masterThesis
  20. 700

    Clustering and Stochastic Simulation Optimization for Outpatient Chemotherapy Appointment Planning and Scheduling by Majed Hadid (17148364)

    Published 2022
    “…A Stochastic Discrete Simulation-Based Multi-Objective Optimization (SDSMO) model is developed and linked to clustering algorithms using an iterative sequential approach. …”