Search alternatives:
system algorithm » swarm algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
complex system » complaint system (Expand Search)
deer algorithm » search algorithm (Expand Search)
elements deer » elementi per (Expand Search)
system algorithm » swarm algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
complex system » complaint system (Expand Search)
deer algorithm » search algorithm (Expand Search)
elements deer » elementi per (Expand Search)
-
161
Resources Allocation for Drones Tracking Utilizing Agent-Based Proximity Policy Optimization
Published 2023“…This paper presents a reinforcement learning agent-based model that works by incorporating the MESA environment with the Stone Soup radar systems simulator. In particular, the Proximity Policy Optimization (PPO) reinforcement algorithm is used to discover a policy for sensor selection that results in optimum sensor resource allocation. …”
Get full text
-
162
Oversampling techniques for imbalanced data in regression
Published 2024“…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …”
-
163
Blockchain-Based Decentralized Architecture for Software Version Control
Published 2023“…The proof of authority (PoA) consensus algorithm will be used to approve the developer communicating modifications to the private blockchain network; the authority will only provide permission and will not be able to add, edit, or delete code files. …”
-
164
Assessment of static pile design methods and non-linear analysis of pile driving
Published 2006“…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. …”
Get full text
Get full text
Get full text
masterThesis -
165
Digital Image Watermarking Using Balanced Multiwavelets
Published 2006“…In this paper, a robust watermarking algorithm using balanced multiwavelet transform is proposed. …”
Get full text
article -
166
-
167
Single-channel speech denoising by masking the colored spectrograms
Published 2025“…Similarly, it offers an improvement of 1 % in STOI and a reduction of 33 and 200 times, respectively, in network size and training epochs when compared to a complex variational U-Net-based model. Also, with comparable PESQ, the proposed system offers almost 2 % improvement in STOI, and a 2 times reduction in network size and 100 times reduction in training epochs, when compared to a lightweight system using automatic dimension reduction of network layers by a structured pruning method.…”
-
168
Optimized 3D Deployment of UAV-Mounted Cloudlets to Support Latency-Sensitive Services in IoT Networks
Published 2019“…We formulate the problem as a mixed integer program, and propose an efficient meta-heuristic solution based on the ions motion optimization algorithm. The performance of the meta-heuristic solution is evaluated and compared to the optimal solution as a function of various system parameters and for different application use cases. …”
Get full text
Get full text
Get full text
Get full text
article -
169
Blood Glucose Regulation Modelling and Intelligent Control
Published 2024Get full text
doctoralThesis -
170
On-demand deployment of multiple aerial base stations for traffic offloading and network recovery
Published 2019“…We present performance results for the proposed algorithm as a function of various system parameters and demonstrate its effectiveness compared to the close-to-optimal greedy approach and its superiority compared to recent related work from the literature.…”
Get full text
Get full text
Get full text
Get full text
article -
171
Optimized provisioning of edge computing resources with heterogeneous workload in IoT networks
Published 2019“…We analyze the effectiveness of the proposed algorithm through extensive simulations and highlight valuable performance trends and trade-offs as a function of various system parameters.…”
Get full text
Get full text
Get full text
Get full text
article -
172
Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review
Published 2024“…The level of electrical consumption required by a security system is directly proportional to its degree of complexity. …”
-
173
The role of Reinforcement Learning in software testing
Published 2023“…However, for some complex software testing scenarios, neither supervised nor unsupervised machine learning techniques were adequate. …”
-
174
Rate Adaptation in Dynamic Adaptive Video Streaming Over HTTP
Published 2021Get full text
doctoralThesis -
175
-
176
Exploring the Dynamic Interplay of Deleterious Variants on the RAF1–RAP1A Binding in Cancer: Conformational Analysis, Binding Free Energy, and Essential Dynamics
Published 2024“…Wild‐type and mutant RAF1–RAP1P bound complexes were subjected to molecular simulation investigation, revealing enhanced structural stability, increased compactness, and stabilized residue fluctuations of the mutant systems in contrast to the wild‐type. …”
-
177
Capillary trapping in mixed-wet porous media: Implications for subsurface carbon dioxide sequestration
Published 2025“…The study also highlights shortcomings of analyzing multiphase flows in mono-wet systems. Insights from this study can be used for improving pore network models and training machine learning algorithms.…”
-
178
A geometric-primitives-based compression scheme for testingsystems-on-a-chip
Published 2001“…The increasing complexity of systems-on-a-chip with the accompanied increase in their test data size has made the need for test data reduction imperative. …”
Get full text
Get full text
article -
179
A residual-accelerated Jacobian method for rapid convergence in reservoir simulation
Published 2025“…<p dir="ltr">Reservoir simulation requires efficient algorithms for complex, nonlinear systems. We introduce a Residual–Accelerated Jacobian (RAJ) for fully implicit reservoir simulation. …”
-
180