Search alternatives:
making algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
data making » data mining (Expand Search)
element » elements (Expand Search)
making algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
data making » data mining (Expand Search)
element » elements (Expand Search)
-
461
An Incentivized and Optimized Dynamic Mechanism for Demand Response for Managing Voltage in Distribution Networks
Published 2022“…An improved hybrid particle swarm optimization algorithm (IHPSO) is proposed for the load controller to provide fast convergence and robust optimization results. …”
-
462
Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images
Published 2023“…The class imbalance issue was handled through multiple data augmentation methods to overcome the biases. …”
-
463
Detection of statistically significant network changes in complex biological networks
Published 2017“…The proposed procedure exploits a more effective model selection criteria to generate <i>p</i>-values for statistical significance and is more efficient in terms of computational time and prediction accuracy than literature methods. Moreover, the structure of the proposed algorithm allows for a faster parallelized implementation.…”
-
464
Metallic coating thickness assessment over nonmagnetic metals using eddy current technology
Published 2019Get full text
doctoralThesis -
465
Accurate multiple network alignment through context-sensitive random walk
Published 2015“…Performance evaluation based on synthetic networks as well as real protein-protein interaction networks shows that the proposed algorithm can construct more accurate multiple network alignments compared to other leading methods.…”
-
466
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…The Internet of Things (IoT) platform allows physical devices to connect directly to the internet and upload data continuously. Insecure access makes IoT platforms vulnerable to different network intrusion attacks. …”
Get full text
Get full text
Get full text
article -
467
Particle swarm optimization approach for protein structure prediction in the 3D HP model
Published 2012“…In this paper, we present a particle swarm optimization (PSO) based algorithm for predicting protein structures in the 3D hydrophobic polar model. …”
Get full text
Get full text
Get full text
article -
468
Assigning proctors to exams using scatter search. (c2006)
Published 2006Get full text
Get full text
masterThesis -
469
Intelligent route to design efficient CO<sub>2</sub> reduction electrocatalysts using ANFIS optimized by GA and PSO
Published 2022“…Considering the high cost and time-consuming experimental investigations, computational methods, particularly machine learning algorithms, can be the appropriate approach for efficiently screening the metal alloys as the electrocatalysts. …”
-
470
The Assessment and Allocation of Public Private Partnership Risks in the UAE
Published 2022Get full text
doctoralThesis -
471
-
472
Online dynamic ensemble deep random vector functional link neural network for forecasting
Published 2023“…Then, an online learning algorithm is designed to learn the edRVFL. Finally, an online dynamic ensemble method, which can measure the change in the distribution, is proposed for aggregating all layers’ outputs. …”
-
473
Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks
Published 2022“…This study proposes an analytical method based on sequential quadratic programming (SQP) methodology coupled with a mean value analysis (MVA) algorithm to solve this NP-Hard problem. …”
-
474
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…<p>The Internet of Things (IoT) platform allows physical devices to connect directly to the internet and upload data continuously. Insecure access makes IoT platforms vulnerable to different network intrusion attacks. …”
-
475
Growing hierarchical self-organizing map for filtering intrusion detection alarms
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
476
Tracking and repairing damaged healthcare databases using the matrix
Published 2015“…The algorithm is based on data dependency and uses a single matrix. …”
Get full text
Get full text
Get full text
Get full text
article -
477
Deep Learning in Smart Grid Technology: A Review of Recent Advancements and Future Prospects
Published 2021“…Motivated by the outstanding success of DL-based prediction methods, this article attempts to provide a thorough review from a broad perspective on the state-of-the-art advances of DL in SG systems. …”
-
478
Optimal supercharge scheduling of electric vehicles
Published 2018“…The distributed game-theoretical approach recorded promising results especially when compared to the well-known shortest job first scheduling algorithm. Further, unlike the other approaches, which normally are centralized and suited for offline scheduling, the game-based method is suited for online scheduling since it played at anytime a batch of EVs requests charging services. …”
Get full text
Get full text
Get full text
Get full text
article -
479
Low Cost Autopilot Design Using Fuzzy Supervisory Control
Published 2005Get full text
doctoralThesis -
480
Information Warfare
Published 2015“…The algorithm is based on data dependency and uses a single matrix that will be later used during recovery.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject