Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
fe algorithm » rd algorithm (Expand Search), deer algorithm (Expand Search), _ algorithms (Expand Search)
elements fe » elements _ (Expand Search), elementi per (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
fe algorithm » rd algorithm (Expand Search), deer algorithm (Expand Search), _ algorithms (Expand Search)
elements fe » elements _ (Expand Search), elementi per (Expand Search)
-
101
A hybrid Harris Hawks optimizer for economic load dispatch problems
Published 2022“…Furthermore, the proposed algorithm is evaluated on two ELD real-world cases which are 6 units-1263 MW and 15units-2630 MW. …”
Get full text
-
102
Estimating Vehicle State by GPS/IMU Fusion with Vehicle Dynamics
Published 2013Get full text
doctoralThesis -
103
On Single Source Reachability Improvement
Published 2022Get full text
Get full text
Get full text
masterThesis -
104
Mobile robots obstacles avoidance using dynamic window approach
Published 2018Get full text
doctoralThesis -
105
Exposure of Botnets in Cloud Environment by Expending Trust Model with CANFES Classification Approach
Published 2022“…Bots’ detection in the cloud environment is a complex process. The purpose of this study was to create a multi-layered architecture that could detect a variety of existing and emerging botnets. …”
-
106
-
107
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…Procurement is an extensive and complex sector in the manufacturing industry, and has attracted an extensive and wide-spreading fraud that directly impacts the operation of an organization and economy at large. …”
Get full text
-
108
Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring
Published 2020“…<p>The revolutionary idea of asymmetric cryptography brings a fundamental change to our modern communication system. However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. …”
-
109
-
110
Adaptive temperature control of a reverse flow process by using reinforcement learning approach
Published 2024“…It should be mentioned that this approach is not reliant on the internal dynamics of the CFRR system, which is a complex process and is most effectively modeled using Partial Differential Equations (PDEs). …”
-
111
ECG Signal Reconstruction on the IoT-Gateway and Efficacy of Compressive Sensing Under Real-Time Constraints
Published 2018“…However, it is usually associated with computational complexity at the decoding end, increasing the latency of the system. …”
-
112
A comprehensive review of deep reinforcement learning applications from centralized power generation to modern energy internet frameworks
Published 2025“…<p>The energy internet (EI) is evolving toward decentralized, data-rich, and time-critical operation, where legacy optimization often fails to meet complexity, scalability, and real-time constraints. …”
-
113
-
114
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
Published 2023“…However, it limits the critical problems of high time complexity, computational cost, difficulty to understand, and reduced level of security. …”
-
115
Transmission Line Fault Location Using Unsynchronized Measurements
Published 2013Get full text
doctoralThesis -
116
FPGA-based Parallel Hardware Architecture for Real-time Object Classification
Published 2014Get full text
doctoralThesis -
117
-
118
-
119
-
120
Reinforcement Learning for Resilient Aerial-IRS Assisted Wireless Communications Networks in the Presence of Multiple Jammers
Published 2024“…<p dir="ltr">The evolving landscape of beyond 5G and 6G wireless communication systems in smart urban environments faces numerous interference-related challenges posed by legitimate and illicit devices. …”