Search alternatives:
modelling algorithm » scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
develop » developed (Expand Search)
element » elements (Expand Search)
modelling algorithm » scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
develop » developed (Expand Search)
element » elements (Expand Search)
-
121
Multiobjective evolutionary algorithms for electric power dispatch problem
Published 2006Get full text
Get full text
article -
122
Intelligent Rapidly-Exploring Random Tree Star Algorithm
Published 2024Get full text
doctoralThesis -
123
Formal synthesis of VLSI layouts from algorithmic specifications
Published 2020Get full text
article -
124
-
125
Social spider optimization algorithm: survey and new applications
Published 2024“…This algorithm has been developed over time, resulting in many versions besides theories and findings. …”
Get full text
-
126
Spectrum Sensing Algorithms for Cooperative Cognitive Radio Networks
Published 2010Get full text
doctoralThesis -
127
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…The objective of this thesis is to propose a methodology to apply ensembling in the detection of infected hosts considering these two aspects. As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …”
Get full text
-
128
Data redundancy management for leaf-edges in connected environments
Published 2022“…Major advances in the fields of Internet and Communication Technology (ICT), data modeling/processing, and sensing technology have rendered traditional environments (e.g., cities, buildings) more connected. …”
Get full text
Get full text
Get full text
Get full text
article -
129
-
130
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…For this purpose, a combination of Decisive Red Fox (DRF) Optimization and Descriptive Back Propagated Radial Basis Function (DBRF) classification are developed in the proposed work. The novelty of this work is, a recently developed DRF optimization methodology incorporated with the machine learning algorithm is utilized for maximizing the security level of IoT systems. …”
-
131
Modelling Exchange Rates during Currency Crisis using Neural Networks
Published 2006“…Exchange rate data from the Lebanese currency crisis period of 1985-1992 is used for training, testing and evaluation of the models. …”
Get full text
Get full text
Get full text
conferenceObject -
132
Integration of Artificial Intelligence in E-Procurement of the Hospitality Industry: A Case Study in the UAE
Published 2020“…The data analytics maturity model is used as the conceptual model for evaluating both data analytics and data governance in this research. …”
Get full text
-
133
Design and development of an embedded controller for roboticmanipulator
Published 1998Get full text
Get full text
article -
134
A method for data path synthesis using neural networks
Published 2017“…Presents a deterministic parallel algorithm to solve the data path allocation problem in high-level synthesis. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
135
Indexing Arabic texts using association rule data mining
Published 2019“…Purpose The purpose of this paper is to propose a new model to enhance auto-indexing Arabic texts. The model denotes extracting new relevant words by relating those chosen by previous classical methods to new words using data mining rules. …”
Get full text
Get full text
Get full text
Get full text
article -
136
Eye-Clustering: An Enhanced Centroids Prediction for K-means Algorithm
Published 2024“…To achieve this goal, supervised machine learning was employed to train models on graphs with labeled data points, where each graph contains a set of points and a label indicating the centroid determined by K-means. …”
Get full text
Get full text
Get full text
masterThesis -
137
A Tabu Search Algorithm For Maintenance Scheduling Of Generating Units
Published 2020“…The algorithm was developed, implemented and tested on an integrated model for the MS problem. …”
Get full text
article -
138
A Tabu Search Algorithm For Maintenance Scheduling Of Generating Units
Published 2020“…The algorithm was developed, implemented and tested on an integrated model for the MS problem. …”
Get full text
article -
139
Power Control Algorithms for Media Transmission in Remote Healthcare Systems
Published 2018“…Thus, this paper first proposes a transmission power control (TPC)-based energy-efficient algorithm (EEA) for when a subject is in different postures, i.e., standing, walking, and running, in wireless body sensor networks. …”
-
140
An efficient approach for textual data classification using deep learning
Published 2022“…<p dir="ltr">Text categorization is an effective activity that can be accomplished using a variety of classification algorithms. In machine learning, the classifier is built by learning the features of categories from a set of preset training data. …”