Search alternatives:
method algorithm » mould algorithm (Expand Search)
would algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
would algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
-
601
Scatter search technique for exam timetabling
Published 2011“…These constraints are conflicting, which makes exam timetabling intractable. Hence, solving this problem in realistic time requires the use of heuristic approaches. …”
Get full text
Get full text
Get full text
article -
602
-
603
Partitioning a graph into degenerate subgraphs
Published 2018Get full text
Get full text
Get full text
Get full text
article -
604
-
605
-
606
Full-fledged semantic indexing and querying model designed for seamless integration in legacy RDBMS
Published 2018“…In this paper, we address the problem of semantic-aware querying and provide a general framework for modeling and processing semantic-based keyword queries in textual databases, i.e., considering the lexical and semantic similarities/disparities when matching user query and data index terms. …”
Get full text
Get full text
Get full text
Get full text
article -
607
Fine-grain watermarking for intellectual property protection
Published 2019“…In particular, the embedding and extraction algorithms allow to continuously protect the watermark through the whole document in a fine-grain fashion. …”
-
608
Condenser capacity and hyperbolic perimeterImage 1
Published 2021“…We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
Get full text
Get full text
Get full text
article -
609
ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks
Published 2022“…Due to the complex nature of the radio environment, analytical models may not characterize the wireless channel, which makes the solution of these problems very difficult. Recently, cognitive network architectures using sophisticated learning techniques are increasingly being applied to such problems. …”
-
610
Condenser capacity and hyperbolic perimeter
Published 2022“…<p dir="ltr">We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
-
611
Frontiers and trends of supply chain optimization in the age of industry 4.0: an operations research perspective
Published 2024“…It contributes to the literature by identifying the four OR innovations to typify the recent advances in SC optimization: new modeling conditions, new inputs, new decisions, and new algorithms. Furthermore, we recommend four promising research avenues in this interplay: (1) incorporating new decisions relevant to data-enabled SC decisions, (2) developing data-enabled modeling approaches, (3) preprocessing parameters, and (4) developing data-enabled algorithms. …”
-
612
Role of authentication factors in Fin-tech mobile transaction security
Published 2023“…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…”
-
613
Deep and transfer learning for building occupancy detection: A review and comparative analysis
Published 2022“…This article provides an in-depth survey of the strategies used to analyze sensor data and determine occupancy. …”
-
614
Large language models for code completion: A systematic literature review
Published 2024“…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. While several research papers have focused on the use of LLMs for code completion, these studies are fragmented, and there is no systematic overview of the use of LLMs for code completion. …”
-
615
DASSI: differential architecture search for splice identification from DNA sequences
Published 2022“…The results have shown a high potential of using automated architecture search mechanism for solving various problems in the field of genomics.…”
-
616
Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases
Published 2024“…The use of AI in ECG analysis has several benefits, including the quick and precise detection of problems like arrhythmias, silent cardiac illnesses, and left ventricular failure. …”
-
617
A decentralized load balancing approach for parallel search-tree optimization
Published 2017“…As a case-study, we use our framework to implement parallel algorithms for the VERTEX COVER and DOMINATING SET problems. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
618
-
619
An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection
Published 2022“…In this paper, a recent swarm intelligence metaheuristic method called RSO which is inspired by the social and hunting behavior of a group of rats is enhanced and explored for FS problems. The binary enhanced RSO is built based on three successive modifications: i) an S-shape transfer function is used to develop binary RSO algorithms; ii) the local search paradigm of particle swarm optimization is used with the iterative loop of RSO to boost its local exploitation; iii) three crossover mechanisms are used and controlled by a switch probability to improve the diversity. …”
-
620
Experimental evaluation of multi-agent reinforcement learning in real-world scale-free networks
Published 2010“…However, the study and analysis of the state-of-the-art multi-agent reinforcement learning (MARL) algorithms have been limited to small problems involving few number of learning agents.The purpose of this project is to conduct an extensive evaluation and comparison of MARL algorithms when used in networks that exhibit the scale-free property. …”
Get full text