Showing 1 - 20 results of 26 for search '(((( element cscap algorithm ) OR ( movement data algorithm ))) OR ( client modeling algorithm ))', query time: 0.13s Refine Results
  1. 1

    Intelligent Bilateral Client Selection in Federated Learning Using Game Theory by Wehbi, Osama

    Published 2022
    “…Based on our simulation findings, our strategy surpasses the VanillaF selection approach in terms of maximizing both the revenues of the client devices and accuracy of the global federated learning model.…”
    Get full text
    Get full text
    Get full text
    masterThesis
  2. 2

    Bird’s Eye View feature selection for high-dimensional data by Samir Brahim Belhaouari (16855434)

    Published 2023
    “…BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …”
  3. 3

    Adaptive Federated Learning Architecture To Mitigate Non-IID Through Multi-Objective GA-Based Efficient Client Selection by Ajaj, Mohamad

    Published 2024
    “…Existing solutions still have several constraints leading to suboptimal model performance and slow convergence. In this paper, we propose a novel approach that incorporates genetic algorithms with an enhanced client selection strategy, utilizing client metadata rather than raw data. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  4. 4

    Particle swarm optimization algorithm: review and applications by Abualigah, Laith

    Published 2024
    “…Particle swarm optimization (PSO) is a heuristic global optimization technique and an optimization algorithm that is swarm intelligence-based. It is based on studies into the movement of bird flocks. …”
    Get full text
  5. 5

    Development of an Optimization Algorithm for Internet Data Traffic by Misbahuddin, Syed

    Published 2020
    “…Furthermore, as the proposed algorithm works at IP datagrams only, therefore, it remains transparent from all client-server applications.…”
    Get full text
    article
  6. 6

    Algorithmic Study of Online Multi-Facility Location Problems by Markarian, Christine

    Published 2022
    “…The aim of the algorithm is then to provide a robust service to all clients while minimizing the total connecting and facility purchasing costs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 7
  8. 8
  9. 9

    RHEEMix in the data jungle: a cost-based optimizer for cross-platform systems. by Sebastian Kruse (18595195)

    Published 2020
    “…Our main contributions are: (i) a mechanism based on graph transformations to explore alternative execution strategies; (ii) a novel graph-based approach to determine efficient data movement plans among subtasks and platforms; and (iii) an efficient plan enumeration algorithm, based on a novel enumeration algebra. …”
  10. 10
  11. 11

    Modeling and automated blackbox regression testing of web applications by Haraty, Ramzi

    Published 2008
    “…Motivated by the fact that there is no single model to represent the entire web application, and to model it from different perspectives at the same time, we propose a single analysis model with it testing techniques which models and tests the three poles of the web application: the client side pages navigated by the user, the server side programs executed at runtime, and the architectural environment hosting the application. …”
    Get full text
    Get full text
    Get full text
    article
  12. 12
  13. 13

    Towards Scalable Process Mining Pipelines by Mohamed, Belal

    Published 2023
    “…Contributions have covered the spectrum of better algorithms, richer comparison metrics, and movement towards online analysis for process data. …”
    Get full text
    Get full text
    Get full text
  14. 14

    Exposure of Botnets in Cloud Environment by Expending Trust Model with CANFES Classification Approach by Nagendra Prabhu Selvaraj (17542041)

    Published 2022
    “…The goal is to be able to detect a larger range of bots and botnets by relying on several techniques called trust model. On this work, the port access verification in trust model is achieved by a Heuristic factorizing algorithm which verifies the port accessibility between client-end-user and client server. …”
  15. 15
  16. 16
  17. 17
  18. 18

    Investigation of Forming a Framework to shortlist contractors in the tendering phase by DABASH, MOHANNAD SALAH

    Published 2022
    “…After obtaining the weights of the decision factors, a model using Machine Learning algorithm on Google Colab was written using the Python language. …”
    Get full text
  19. 19

    A 3-D vision-based man-machine interface for hand-controlled telerobot by Al-Mouhamed, M.A.

    Published 2005
    “…To determine the three-dimensional (3-D) position a tracking algorithm based on uncalibrated cameras with weak perspective projection model is used. …”
    Get full text
    Get full text
    article
  20. 20