Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
abs algorithm » jaya algorithm (Expand Search), rd algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
abs algorithm » jaya algorithm (Expand Search), rd algorithm (Expand Search)
-
161
-
162
-
163
Structural similarity evaluation between XML documents and DTDs
Published 2007Get full text
Get full text
Get full text
Get full text
conferenceObject -
164
Resources Allocation for Drones Tracking Utilizing Agent-Based Proximity Policy Optimization
Published 2023“…This paper presents a reinforcement learning agent-based model that works by incorporating the MESA environment with the Stone Soup radar systems simulator. In particular, the Proximity Policy Optimization (PPO) reinforcement algorithm is used to discover a policy for sensor selection that results in optimum sensor resource allocation. …”
Get full text
-
165
Software defect prediction. (c2019)
Published 2019“…Software systems are becoming more and more complex. With the increasing size and complexity of software systems, it is becoming more challenging to assess their quality. …”
Get full text
Get full text
Get full text
masterThesis -
166
-
167
Nonlinear Friction Identification of A Linear Voice Coil DC Motor
Published 2015Get full text
doctoralThesis -
168
UML-based regression testing for OO software
Published 2010“…When working with large and complex object-oriented systems, source code-based regression testing is usually costly. …”
Get full text
Get full text
Get full text
article -
169
Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review
Published 2024“…The level of electrical consumption required by a security system is directly proportional to its degree of complexity. …”
-
170
UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices
Published 2019“…To solve it, we first propose the high-complexity branch, reduce and bound (BRB) algorithm to find the global optimal solution for relatively small scale scenarios. …”
Get full text
Get full text
Get full text
Get full text
article -
171
Clustering and Stochastic Simulation Optimization for Outpatient Chemotherapy Appointment Planning and Scheduling
Published 2022“…However, developing a comprehensive and stochastic decision support system in the OCP environment is complex. Thus, the multi-stages of OCP, stochastic durations, probability of uncertain events occurrence, patterns of patient arrivals, acuity levels of nurses, demand variety, and complex patient pathways are rarely addressed together. …”
-
172
-
173
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
174
Uplink Noma in UAV-Assisted IoT Networks
Published 2022“…The second device is then selected using a heuristic algorithm based on prioritizing devices with higher bit rate requirements and strict deadlines. …”
Get full text
Get full text
Get full text
masterThesis -
175
Developing an online hate classifier for multiple social media platforms
Published 2020“…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …”
-
176
Measuring ripple effect for object-oriented programs. (c2004)
Published 2004Get full text
Get full text
masterThesis -
177
Joint computing, communication and cost-aware task offloading in D2D-enabled Het-MEC
Published 2022“…We formulate and solve the optimal allocation strategy then decompose the problem into two sub-problems in an attempt to reduce its complexity. Furthermore, we propose a low-complexity algorithm that generates high performance results and can be applied for large-scale networks. …”
Get full text
Get full text
Get full text
Get full text
article -
178
Digital Image Watermarking Using Balanced Multiwavelets
Published 2006“…In this paper, a robust watermarking algorithm using balanced multiwavelet transform is proposed. …”
Get full text
article -
179
Machine Learning Techniques for Pharmaceutical Bioinformatics
Published 2018“…The complexity of the chemical and pharmacological features forces the interaction between drug molecule and all other entities in the biological system to follow specific rules. …”
Get full text
-
180
Optimized 3D Deployment of UAV-Mounted Cloudlets to Support Latency-Sensitive Services in IoT Networks
Published 2019“…We formulate the problem as a mixed integer program, and propose an efficient meta-heuristic solution based on the ions motion optimization algorithm. The performance of the meta-heuristic solution is evaluated and compared to the optimal solution as a function of various system parameters and for different application use cases. …”
Get full text
Get full text
Get full text
Get full text
article