Search alternatives:
processing algorithm » processing algorithms (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
data modeling » data models (Expand Search), spatial modeling (Expand Search)
td3 algorithm » rd algorithm (Expand Search)
processing algorithm » processing algorithms (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
data modeling » data models (Expand Search), spatial modeling (Expand Search)
td3 algorithm » rd algorithm (Expand Search)
-
221
-
222
Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm
Published 2022“…The forecasting performance of the proposed model is compared with other population-based optimized IT2-FLS including genetic algorithm and artificial bee colony optimization algorithm. …”
-
223
-
224
Minimizing Deadline Misses of Mobile IoT Requests in a Hybrid Fog- Cloud Computing Environment
Published 2019Get full text
doctoralThesis -
225
SemIndex+: A semantic indexing scheme for structured, unstructured, and partly structured data
Published 2018“…This paper describes SemIndex+, a semantic-aware indexing and querying framework that allows semantic search, result selection, and result ranking of structured (relational DB-style), unstructured (IR-style), and partly structured (NoSQL) data. Various weighting functions and a parallelized search algorithm have been developed for that purpose and are presented here. …”
Get full text
Get full text
Get full text
Get full text
article -
226
Practical single node failure recovery using fractional repetition codes in data centers
Published 2016“…Hence, a practical solution for node failures is presented by using a self-designed genetic algorithm that searches within the feasible solution space. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
227
Prediction the performance of multistage moving bed biological process using artificial neural network (ANN)
Published 2020“…To cope with this difficult task and perform an effective and well-controlled BP operation, an artificial neural network (ANN) algorithm was developed to simulate, model, and control a three-stage (anaerobic/anoxic and MBBR) enhanced nutrient removal biological process (ENR-BP) challenging real wastewater. …”
-
228
A Data-Driven Decision-Making Framework for Fleet Management in the Government Sector of Dubai
Published 2024“…My research aims to develop a data-driven decision support framework for fleet management, focusing on leveraging advanced algorithms, including decision trees and random forests, to generate domain-specific AI models. …”
Get full text
-
229
-
230
On sensor selection in mobile devices based on energy, application accuracy, and context metrics
Published 2013“…We use this algorithm to build a sensor selection model to choose among location sensors. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
231
Blue collar laborers’ travel pattern recognition: Machine learning classifier approach
Published 2021“…Raw data preprocessing and outliers detection and filtering algorithms were applied at the first stage of the analysis, and consequently, an activity-based travel matrix was developed for each household. …”
-
232
-
233
An App for Navigating Patient Transportation and Acute Stroke Care in Northwestern Ontario Using Machine Learning: Retrospective Study
Published 2024“…The data were distributed for training (35%), testing (35%), and validation (30%) of the prediction model.…”
-
234
Cyberbullying Detection and Abuser Profile Identification on Social Media for Roman Urdu
Published 2024Subjects: -
235
A Cyber-Physical System and Graph-Based Approach for Transportation Management in Smart Cities
Published 2021“…To efficiently process the incoming big data streams, the proposed architecture uses the Apache GraphX tool with several parallel processing nodes, along with Spark and Hadoop that ultimately provide better performance against various state-of-the-art solutions. …”
-
236
Frontiers and trends of supply chain optimization in the age of industry 4.0: an operations research perspective
Published 2024“…Furthermore, we recommend four promising research avenues in this interplay: (1) incorporating new decisions relevant to data-enabled SC decisions, (2) developing data-enabled modeling approaches, (3) preprocessing parameters, and (4) developing data-enabled algorithms. …”
-
237
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
Published 2023“…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …”
-
238
Parameter identification of PV solar cells and modules using bio dynamics grasshopper optimization algorithm
Published 2024“…The study evaluates the BDGOA by applying it to identify unknown parameters of five solar modules. The algorithm's effectiveness is demonstrated through the extraction of parameters for RTC France, PWP201, SM55, KC200GT, and SW255 models, validated against experimental data under diverse conditions. …”
-
239
Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images
Published 2022“…Over the decade, numerous artificial neural network (ANN)-based techniques were adopted in order to diagnose and classify breast cancer due to the unique characteristics of learning key features from complex data via a training process. However, these schemes have limitations like slow convergence and longer training time. …”
-
240
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
Published 2007“…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …”
Get full text
Get full text
Get full text
article