Search alternatives:
system algorithm » swarm algorithm (Expand Search)
making algorithm » cosine algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
complex system » complaint system (Expand Search)
element » elements (Expand Search)
system algorithm » swarm algorithm (Expand Search)
making algorithm » cosine algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
complex system » complaint system (Expand Search)
element » elements (Expand Search)
-
161
DRL-Based IRS-Assisted Secure Hybrid Visible Light and mmWave Communications
Published 2024“…This work centers on developing an intelligent hybrid system combining communication lines using millimeter wave (mmWave) and Visible light communication (VLC). …”
-
162
Enhanced Inverse Model Predictive Control for EV Chargers: Solution for Rectifier-Side
Published 2024“…IMPC inherits the advantages of model predictive control (MPC) in terms of ability to handle complex and nonlinear systems and achieving multiple control objectives, while adhering to various constraints. …”
-
163
The Generalization of Bidirectional Dual Active Bridge DC/DC Converter Modulation Schemes: State-of-the-Art Analysis under Triple Phase Shift Control
Published 2023“…Additionally, a generic optimization algorithm is developed to show the advantages of TPS modulation, and thus, the analysis in this paper offers a valuable insight for single-phase DAB converter designers in identifying a wide range of optimization algorithms to achieve higher efficiency under TPS modulation. …”
-
164
Joint computing, communication and cost-aware task offloading in D2D-enabled Het-MEC
Published 2022“…We formulate and solve the optimal allocation strategy then decompose the problem into two sub-problems in an attempt to reduce its complexity. Furthermore, we propose a low-complexity algorithm that generates high performance results and can be applied for large-scale networks. …”
Get full text
Get full text
Get full text
Get full text
article -
165
Machine Learning Techniques for Pharmaceutical Bioinformatics
Published 2018“…The complexity of the chemical and pharmacological features forces the interaction between drug molecule and all other entities in the biological system to follow specific rules. …”
Get full text
-
166
Predicting Calcein Release from Ultrasound-Targeted Liposomes: A Comparative Analysis of Random Forest and Support Vector Machine
Published 2024“…In recent years, Machine Learning (ML) has shown potential for modeling complex drug delivery systems and predicting drug release dynamics with a greater degree of precision. …”
Get full text
article -
167
Resources Allocation for Drones Tracking Utilizing Agent-Based Proximity Policy Optimization
Published 2023“…This paper presents a reinforcement learning agent-based model that works by incorporating the MESA environment with the Stone Soup radar systems simulator. In particular, the Proximity Policy Optimization (PPO) reinforcement algorithm is used to discover a policy for sensor selection that results in optimum sensor resource allocation. …”
Get full text
-
168
Oversampling techniques for imbalanced data in regression
Published 2024“…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …”
-
169
Blockchain-Based Decentralized Architecture for Software Version Control
Published 2023“…The proof of authority (PoA) consensus algorithm will be used to approve the developer communicating modifications to the private blockchain network; the authority will only provide permission and will not be able to add, edit, or delete code files. …”
-
170
Assessment of static pile design methods and non-linear analysis of pile driving
Published 2006“…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. …”
Get full text
Get full text
Get full text
masterThesis -
171
Digital Image Watermarking Using Balanced Multiwavelets
Published 2006“…In this paper, a robust watermarking algorithm using balanced multiwavelet transform is proposed. …”
Get full text
article -
172
-
173
Single-channel speech denoising by masking the colored spectrograms
Published 2025“…Similarly, it offers an improvement of 1 % in STOI and a reduction of 33 and 200 times, respectively, in network size and training epochs when compared to a complex variational U-Net-based model. Also, with comparable PESQ, the proposed system offers almost 2 % improvement in STOI, and a 2 times reduction in network size and 100 times reduction in training epochs, when compared to a lightweight system using automatic dimension reduction of network layers by a structured pruning method.…”
-
174
Optimized 3D Deployment of UAV-Mounted Cloudlets to Support Latency-Sensitive Services in IoT Networks
Published 2019“…We formulate the problem as a mixed integer program, and propose an efficient meta-heuristic solution based on the ions motion optimization algorithm. The performance of the meta-heuristic solution is evaluated and compared to the optimal solution as a function of various system parameters and for different application use cases. …”
Get full text
Get full text
Get full text
Get full text
article -
175
Blood Glucose Regulation Modelling and Intelligent Control
Published 2024Get full text
doctoralThesis -
176
On-demand deployment of multiple aerial base stations for traffic offloading and network recovery
Published 2019“…We present performance results for the proposed algorithm as a function of various system parameters and demonstrate its effectiveness compared to the close-to-optimal greedy approach and its superiority compared to recent related work from the literature.…”
Get full text
Get full text
Get full text
Get full text
article -
177
Optimized provisioning of edge computing resources with heterogeneous workload in IoT networks
Published 2019“…We analyze the effectiveness of the proposed algorithm through extensive simulations and highlight valuable performance trends and trade-offs as a function of various system parameters.…”
Get full text
Get full text
Get full text
Get full text
article -
178
Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review
Published 2024“…The level of electrical consumption required by a security system is directly proportional to its degree of complexity. …”
-
179
The role of Reinforcement Learning in software testing
Published 2023“…However, for some complex software testing scenarios, neither supervised nor unsupervised machine learning techniques were adequate. …”
-
180
Rate Adaptation in Dynamic Adaptive Video Streaming Over HTTP
Published 2021Get full text
doctoralThesis