Search alternatives:
rast algorithm » jaya algorithm (Expand Search), rd algorithm (Expand Search)
data tracking » radar tracking (Expand Search)
develop » developed (Expand Search)
element » elements (Expand Search)
rast algorithm » jaya algorithm (Expand Search), rd algorithm (Expand Search)
data tracking » radar tracking (Expand Search)
develop » developed (Expand Search)
element » elements (Expand Search)
-
201
Methods for system-on-chip test design, scheduling and optimization. (c2006)
Published 2006Get full text
Get full text
masterThesis -
202
Clustering and Stochastic Simulation Optimization for Outpatient Chemotherapy Appointment Planning and Scheduling
Published 2022“…A Stochastic Discrete Simulation-Based Multi-Objective Optimization (SDSMO) model is developed and linked to clustering algorithms using an iterative sequential approach. …”
-
203
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
Published 2023“…Various machine learning and deep learning-based cyborg intelligence mechanisms have been developed to protect smart city networks by ensuring property, security, and privacy. …”
-
204
Performance Analysis of Artificial Neural Networks in Forecasting Financial Time Series
Published 2013Get full text
doctoralThesis -
205
Could Petrol Stations Play a Key Role in Transportation Electrification? A GIS-Based Coverage Maximization of Fast EV Chargers in Urban Environment
Published 2022“…More specifically, the location problem is modelled as a maximum coverage location problem (MCLP) and solved using a geographic information system (GIS) based platform. The spatial optimization problem is solved using a linear-programming relaxation based MCLP algorithm developed in Python. …”
-
206
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
Published 2022“…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
-
207
A Literature Review on System Dynamics Modeling for Sustainable Management of Water Supply and Demand
Published 2023“…The solution approaches included the genetic algorithm (GA), particle swarm optimization (PSO), and the non-dominated sorting genetic algorithm (NSGA-II). …”
-
208
-
209
Artificial Intelligence (AI) based machine learning models predict glucose variability and hypoglycaemia risk in patients with type 2 diabetes on a multiple drug regimen who fast d...
Published 2020“…<h3>Objective</h3><p dir="ltr">To develop a machine-based algorithm from clinical and demographic data, physical activity and glucose variability to predict hyperglycaemic and hypoglycaemic excursions in patients with type 2 diabetes on multiple glucose lowering therapies who fast during Ramadan.…”
-
210
-
211
Short-Term Load Forecasting in Active Distribution Networks Using Forgetting Factor Adaptive Extended Kalman Filter
Published 2023“…A few research studies focused on developing data filtering algorithm for the load forecasting process using approaches such as Kalman filter, which has good tracking capability in the presence of noise in the data collection process. …”
-
212
-
213
Online Control and Optimization of Directional Drilling
Published 2020“…The objective function considered is to minimize the tracking error and drilling efforts. Detailed mathematical formulation and computer simulation were used for evaluation of the performance of the proposed techniques for both systems, based on real well data.…”
Get full text
masterThesis -
214
-
215
A TABU SEARCH APPROACH TO THE CLUSTERING PROBLEM
Published 2020“…In this paper, we develop a new algorithm for solving this problem based on a tabu search technique. …”
Get full text
article -
216
Tabu Search For A Class Of Single-Machine Scheduling Problems
Published 2020“…The performance of the developed algorithm is tested for solving the variance minimization problem. …”
Get full text
article -
217
Turbo-charging dominating set with an FPT subroutine
Published 2017“…Turbo-charging is a recent algorithmic technique that is based on the fixed-parameter tractability of the dynamic versions of some problems as a way to improve heuristics. …”
Get full text
Get full text
Get full text
conferenceObject -
218
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
219
UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices
Published 2019“…Then, we develop an effective sub-optimal algorithm based on successive convex approximation in order to obtain results for larger network scenarios. …”
Get full text
Get full text
Get full text
Get full text
article -
220