Search alternatives:
developing control » developing countries (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
developing control » developing countries (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
-
501
Multi-Agent Meta Reinforcement Learning for Reliable and Low-Latency Distributed Inference in Resource-Constrained UAV Swarms
Published 2025“…Given the complexity of the LDTP solution for managing online requests, we propose a real-time, lightweight solution using multi-agent meta-reinforcement learning. Our approach is tested on CNN networks and benchmarked against state-of-the-art conventional reinforcement learning algorithms. …”
-
502
Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks
Published 2024“…Specifically, we focus on the Controller Area Network (CAN) protocol, which is prevalent in in-vehicle communication systems, yet exhibits inherent security vulnerabilities. …”
-
503
-
504
Wide area monitoring system operations in modern power grids: A median regression function-based state estimation approach towards cyber attacks
Published 2023“…The algorithm was stationed at each monitoring node using interacting multiple model (IMM)-based fusion architecture. …”
-
505
Identification of errors-in-variables model with observation outliers based on Minimum-Covariance-Determinant
Published 2007“…In order to solve the MCD problem for the EIV model we propose a random search algorithm. The proposed algorithm has been applied to a heat exchanger data.…”
Get full text
Get full text
article -
506
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
Published 2019“…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. …”
Get full text
-
507
A hybrid approach for XML similarity
Published 2007“…Various algorithms for comparing hierarchically structured data, e.g. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
508
Applications of fast fourier transform in the integrity evaluation of deep foundations
Published 2016“…The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …”
Get full text
Get full text
Get full text
Get full text
article -
509
On the complexity of multi-parameterized cluster editing
Published 2017“…In other words, Cluster Editing can be solved efficiently when the number of false positives/negatives per single data element is expected to be small compared to the minimum cluster size. …”
Get full text
Get full text
Get full text
Get full text
article -
510
Decomposition-based wind power forecasting models and their boundary issue: An in-depth review and comprehensive discussion on potential solutions
Published 2022“…This study will provide useful references for a wide range of future studies for developing accurate and practical wind power forecasting models.…”
-
511
Recursive Parameter Identification Of A Class Of Nonlinear Systems From Noisy Measurements
Published 2020“…The model structure is made up of two linear dynamic elements separated by a nonlinear static one. The nonlinear element is assumed to be of the polynomial type with known order; The identification is based on input/output data where the output is contaminated with measurement noise. …”
Get full text
article -
512
Anomaly Detection Based Framework for Profile Monitoring
Published 2023Get full text
doctoralThesis -
513
Structural similarity evaluation between XML documents and DTDs
Published 2007“…The automatic processing and management of XML-based data are ever more popular research issues due to the increasing abundant use of XML, especially on the Web. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
514
A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis
Published 2021“…Specifically, we used a clustering algorithm to group published articles based on the similarity of their abstracts to identify research hotspots and current research directions. …”
-
515
A survey and comparison of wormhole routing techniques in a meshnetworks
Published 1997“…Although an extremely wide number of routing algorithms have been proposed and implemented in hardware and software, it is difficult for the designer of a multicomputer to choose the best routing algorithm given a particular architectural configuration. …”
Get full text
Get full text
article -
516
-
517
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
Published 2021“…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…”
-
518
Morphology for Planar Hexagonal Modular Self-Reconfigurable Robotic Systems
Published 2009Get full text
doctoralThesis -
519
I Will Survive: An Event-driven Conformance Checking Approach Over Process Streams
Published 2023“…This paper introduces a new approximate algorithm – I Will Survive (IWS). The algorithm utilizes the trie data structure to improve the calculation speed, while remaining memory-efficient. …”
Get full text
Get full text
Get full text
-
520
Graph contraction for physical optimization methods
Published 1993“…We then present experimental results on using contracted graphs as inputs to two physical optimization methods; namely, Genetic Algorithm and Simulated Annealing. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject