Search alternatives:
making algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
data making » data mining (Expand Search)
making algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
data making » data mining (Expand Search)
-
141
The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions
Published 2022“…Then, we provide a comprehensive review of the most widely used DRL algorithms to address RRAM problems, including the value- and policy-based algorithms. …”
-
142
Forward simulation of three-dimensional advection-diffusion using a fundamental solution for a linear flow
Published 2022“…We then apply the algorithm to Ekman flows in two and three dimensions and compare our results in two dimensions to the grid based, finite element solver COMSOL Multiphysics. …”
Get full text
Get full text
Get full text
masterThesis -
143
An EM-Based Forward-Backward Kalman Filter for the Estimation of Time-Variant Channels in OFDM
Published 0000“…The algorithm makes a collective use of the data and channel constraints inherent in the communication problem. …”
Get full text
Get full text
article -
144
An Ontology-based Semantic Web for Arabic Question Answering: The Case of E-Government Services
Published 2018“…Further, 414 automatic questions are tested on the QA algorithm using two methods, semantics-based and keyword-based. …”
Get full text
-
145
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…The semantically augmented XML data tree is processed for structural node clustering, based on semantic query concepts (i.e., key-concepts), in order to identify and rank candidate answer sub-trees containing related occurrences of query key-concepts. …”
Get full text
Get full text
Get full text
Get full text
article -
146
Vehicular-OBUs-As-On-Demand-Fogs
Published 2020“…For instance, real-time vehicular applications require fast processing of the vast amount of generated data by vehicles in order to maintain service availability and reachability while driving. …”
Get full text
Get full text
Get full text
Get full text
article -
147
A Biologicaly Inspired Decision Model for Multivariable Genetic- Fuzzy-AHP System
Published 2016“…The proposed GFT mechanism can be applied to any decision making problem within an uncertain environment. One example would be the determination of CRM performance measurement given a variety of inputs related to marketing, data mining tools, ordered materials and communication.…”
Get full text
Get full text
Get full text
Get full text
article -
148
Real-Time Path-Planning using Depth/INS Sensor Fusion for Localization
Published 2019Get full text
doctoralThesis -
149
Design of A Theoretical Framework For A Real-Time Fire Evacuation Guidance System
Published 2020Get full text
doctoralThesis -
150
Future Prediction of COVID-19 Vaccine Trends Using a Voting Classifier
Published 2021“…Multiple ML algorithms are used to improve decision-making at different aspects after forecasting. …”
-
151
Modeling and Control of a Thermally Driven MEMS Actuator for RF Applications
Published 2017Get full text
doctoralThesis -
152
Microwave brain imaging system to detect brain tumor using metamaterial loaded stacked antenna array
Published 2022“…The antenna is comprised of metamaterial-loaded with three substrate layers, including two air gaps. One 1 × 4 MTM array element is used in the top layer and middle layer, and one 3 × 2 MTM array element is used in the bottom layer. …”
-
153
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…The Internet of Things (IoT) platform allows physical devices to connect directly to the internet and upload data continuously. Insecure access makes IoT platforms vulnerable to different network intrusion attacks. …”
Get full text
Get full text
Get full text
article -
154
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…<p>The Internet of Things (IoT) platform allows physical devices to connect directly to the internet and upload data continuously. Insecure access makes IoT platforms vulnerable to different network intrusion attacks. …”
-
155
Growing hierarchical self-organizing map for filtering intrusion detection alarms
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
156
Inception voltage of corona in bipolar ionized fields-effect oncorona power loss
Published 1996“…In this paper, an iterative finite element based algorithm is presented as a numerical tool for the solution of the bipolar ionized field around high voltage direct current (HVDC) transmission lines. …”
Get full text
Get full text
article -
157
An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation
Published 2001“…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …”
Get full text
article -
158
An evolutionary meta-heuristic for state justification insequential automatic test pattern generation
Published 2001“…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …”
Get full text
Get full text
article -
159
Modeling and Guidance of an Underactuated Autonomous Underwater Vehicle
Published 2017Get full text
doctoralThesis -
160
Improving Rule Set Based Software Quality Prediction
Published 2003Get full text
Get full text
article