Search alternatives:
processing algorithm » processing algorithms (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
system » systems (Expand Search)
processing algorithm » processing algorithms (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
system » systems (Expand Search)
-
161
Random Forest Bagging and X‐Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data
Published 2021“…In addition, for grouping similar antipatterns, a clustering process was performed to eradicate the design errors. …”
-
162
Severity-Based Prioritized Processing of Packets with Application in VANETs
Published 2019“…In this study, we propose a generic prioritization and resource management algorithm that can be used to prioritize processing of received packets in vehicular networks. …”
-
163
-
164
-
165
A Blockchain Model for Secure Communications in Internet of Vehicles
Published 2021“…In this paper, we present a framework for secure IoV communications by utilizing the High Performance Blockchain Consensus (HPBC) algorithm. Based on a previously published communication model for VANETs that uses an efficient routing protocol for transmitting packets between vehicles, we describe in this paper how to integrate a blockchain model on top of the IoV communications system. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
166
An efficient claim management assurance system using EPC contract based on improved monarch butterfly optimization models
Published 2024“…To address these challenges, a claim management system is developed based on the Improved Monarch Butterfly Optimization Algorithm (IMBOA) and the principles of EPC. …”
-
167
Gas Metal Arc Welding (GMAW) Process Optimization Using Machine Learning Models
Published 2023Get full text
doctoralThesis -
168
-
169
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
Published 2024“…As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. There are many machine-learning and deep-learning algorithms have been developed by researchers. …”
-
170
Integrating Quality And Maintenance Decisions In A Production- Inventory Model For Deteriorating Items
Published 2020“…In typical production-inventory models of deteriorating items, deterioration of the production process has not been considered. …”
Get full text
article -
171
-
172
-
173
Bee Colony Algorithm for Proctors Assignment.
Published 2015“…The Bee Colony algorithm is a recent population-based search algorithm that mimics the natural behavior of swarms of honey bees during the process of collecting food. …”
Get full text
Get full text
Get full text
article -
174
-
175
-
176
Process Mining over Unordered Event Streams
Published 2020“…Process mining is no longer limited to the one-off analysis of static event logs extracted from a single enterprise system. …”
Get full text
Get full text
Get full text
-
177
A combined resource allocation framework for PEVs charging stations, renewable energy resources and distributed energy storage systems
Published 2017“…The massive deployment of plug-in electric vehicles (PEVs), renewable energy resources (RES), and distributed energy storage systems (DESS) has gained significant interest under the smart grid vision. …”
Get full text
article -
178
An Effective Hybrid NARX-LSTM Model for Point and Interval PV Power Forecasting
Published 2021“…Then, the stacked LSTM model, optimized by Tabu search algorithm, uses the residual error correction associated with the original data to produce a point and interval PVPF. …”
-
179
-
180