Search alternatives:
cosine algorithm » colony algorithm (Expand Search)
coding algorithm » colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
cosine algorithm » colony algorithm (Expand Search)
coding algorithm » colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
-
121
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
Published 2023“…Here, the Quantized Identical Data Imputation (QIDI) mechanism is implemented at first for data preprocessing and normalization. …”
-
122
Clustering and Stochastic Simulation Optimization for Outpatient Chemotherapy Appointment Planning and Scheduling
Published 2022“…However, developing a comprehensive and stochastic decision support system in the OCP environment is complex. Thus, the multi-stages of OCP, stochastic durations, probability of uncertain events occurrence, patterns of patient arrivals, acuity levels of nurses, demand variety, and complex patient pathways are rarely addressed together. …”
-
123
-
124
A Survey of Deep Learning Approaches for the Monitoring and Classification of Seagrass
Published 2025“…By synthesizing findings across various data sources and model architectures, we offer critical insights into the selection of context-aware algorithms and identify key research gaps, an essential step for advancing the reliability and applicability of AI-driven seagrass conservation efforts.…”
-
125
Predicting and Interpreting Student Performance Using Machine Learning in Blended Learning Environments in a Jordanian School Context
Published 0024“…These platforms enhance academic performance by fostering collaborative learning environments and generating extensive data from every user interaction. Machine learning algorithms can process large and complex datasets to identify patterns and trends that may not be immediately apparent. …”
Get full text
-
126
Digital Image Watermarking Using Balanced Multiwavelets
Published 2006“…In this paper, a robust watermarking algorithm using balanced multiwavelet transform is proposed. …”
Get full text
article -
127
Oversampling techniques for imbalanced data in regression
Published 2024“…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …”
-
128
Blockchain-Based Decentralized Architecture for Software Version Control
Published 2023“…The proof of authority (PoA) consensus algorithm will be used to approve the developer communicating modifications to the private blockchain network; the authority will only provide permission and will not be able to add, edit, or delete code files. …”
-
129
Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks
Published 2023“…The simulation results show that the proposed algorithm outperforms the above-mentioned reference algorithms in all evaluation metrics and is proved to be comparable to the optimal solution given its low complexity.…”
-
130
A Hardware Model of an Expandable RSA Cryptogrsphic System
Published 1998“…Data security is an important aspect of information transmission and storage in an electronic form. …”
Get full text
masterThesis -
131
Transmission Line Fault Location Using Unsynchronized Measurements
Published 2013Get full text
doctoralThesis -
132
Structural similarity evaluation between XML documents and DTDs
Published 2007“…It is of polynomial complexity, in comparison with existing exponential algorithms. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
133
Modelling of pollutant transport in compound open channels
Published 1998“…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …”
Get full text
Get full text
masterThesis -
134
Hardware Model of an Expandable RSA Cryptographic System
Published 1998“…Data security is an important aspect of information transmission and storage in an electronic form. …”
Get full text
Get full text
Get full text
masterThesis -
135
Joint computing, communication and cost-aware task offloading in D2D-enabled Het-MEC
Published 2022“…We formulate and solve the optimal allocation strategy then decompose the problem into two sub-problems in an attempt to reduce its complexity. Furthermore, we propose a low-complexity algorithm that generates high performance results and can be applied for large-scale networks. …”
Get full text
Get full text
Get full text
Get full text
article -
136
-
137
ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks
Published 2022“…In this paper, we propose data-driven machine learning (ML) schemes to efficiently solve these problems in wireless LAN (WLAN) networks. …”
-
138
Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review
Published 2024“…During the training phase, machine-learning systems may face challenges due to the large amount of data required and the complex nature of the training procedure. …”
-
139
Optimized provisioning of edge computing resources with heterogeneous workload in IoT networks
Published 2019“…In addition, the considerable amount of data they generate brings extra burden to the existing wireless network infrastructure. …”
Get full text
Get full text
Get full text
Get full text
article -
140
Automatic Recognition of Poets for Arabic Poetry using Deep Learning Techniques (LSTM and Bi-LSTM)
Published 2024“…LSTM has proven its capability for sequential data analysis in many different languages. Our reported results have shown promising classification accuracy with an average of 92.35%. …”
Get full text