Showing 101 - 120 results of 196 for search '(((( complex system algorithm ) OR ( elements rl algorithm ))) OR ( level coding algorithm ))', query time: 0.17s Refine Results
  1. 101
  2. 102

    ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks by Muhammad Asif Khan (7367468)

    Published 2022
    “…Two well-known problems related to device mobility are handover prediction and access point selection. Due to the complex nature of the radio environment, analytical models may not characterize the wireless channel, which makes the solution of these problems very difficult. …”
  3. 103

    Impact of Charging Electric Vehicles under Different State of Charge Levels and Extreme Conditions by Claude Ziad El-Bayeh (17542284)

    Published 2021
    “…Once these constraints are violated, the optimization algorithm might not work correctly and might not converge to a feasible solution, especially when the complexity of the system increases and includes nonlinearities. …”
  4. 104

    A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security by Shitharth Selvarajan (14157976)

    Published 2024
    “…Therefore, the proposed work aims to develop a Decentralized Identifiable Distributed Ledger Technology‐Blockchain (DIDLT‐BC) framework that is intelligent and effective, requiring the least amount of computing complexity to ensure cloud IoT system safety. In this case, the Rabin algorithm produces the digital signature needed to start the transaction. …”
  5. 105

    A hybrid Harris Hawks optimizer for economic load dispatch problems by Al-Betar, Mohammed Azmi

    Published 2022
    “…ELD is an important problem in power systems that is tackled by finding the optimal schedule of the generation units that minimize fuel conceptions under a set of constraints. …”
    Get full text
  6. 106

    Adaptive PPO With Multi-Armed Bandit Clipping and Meta-Control for Robust Power Grid Operation Under Adversarial Attacks by Mohamed Massaoudi (16888710)

    Published 2025
    “…However, maintaining high operational stability is increasingly challenging due to evolving grid complexities and potential adversarial threats. This paper proposes a novel composite enhanced proximal policy optimization (CePPO) algorithm to improve power grid operation under adversarial conditions. …”
  7. 107
  8. 108

    Exposure of Botnets in Cloud Environment by Expending Trust Model with CANFES Classification Approach by Nagendra Prabhu Selvaraj (17542041)

    Published 2022
    “…Further, back-off features are extracted from the particular node and all these structures are trained and categorized with a Co-Active Neuro Fuzzy Expert System (CANFES) classifier. The performance of the proposed bot detection system in the internet environment is analyzed latency, detection rate, packet delivery ration, energy availability and precision.…”
  9. 109
  10. 110

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector by AL HAMMADI, SUMAYYA ABDULLA

    Published 2022
    “…Procurement is an extensive and complex sector in the manufacturing industry, and has attracted an extensive and wide-spreading fraud that directly impacts the operation of an organization and economy at large. …”
    Get full text
  11. 111

    Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring by Muzna Yumman (16494023)

    Published 2020
    “…<p>The revolutionary idea of asymmetric cryptography brings a fundamental change to our modern communication system. However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. …”
  12. 112

    Adaptive temperature control of a reverse flow process by using reinforcement learning approach by A. Binid (22046054)

    Published 2024
    “…It should be mentioned that this approach is not reliant on the internal dynamics of the CFRR system, which is a complex process and is most effectively modeled using Partial Differential Equations (PDEs). …”
  13. 113
  14. 114

    ECG Signal Reconstruction on the IoT-Gateway and Efficacy of Compressive Sensing Under Real-Time Constraints by Mohammed Al Disi (16855407)

    Published 2018
    “…However, it is usually associated with computational complexity at the decoding end, increasing the latency of the system. …”
  15. 115

    A comprehensive review of deep reinforcement learning applications from centralized power generation to modern energy internet frameworks by Sakib Mahmud (15302404)

    Published 2025
    “…<p>The energy internet (EI) is evolving toward decentralized, data-rich, and time-critical operation, where legacy optimization often fails to meet complexity, scalability, and real-time constraints. …”
  16. 116
  17. 117

    A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security by S. Shitharth (12017480)

    Published 2023
    “…However, it limits the critical problems of high time complexity, computational cost, difficulty to understand, and reduced level of security. …”
  18. 118
  19. 119
  20. 120