Search alternatives:
sampling algorithm » scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
sampling algorithm » scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
-
101
Detecting sleep outside the clinic using wearable heart rate devices
Published 2022“…<p dir="ltr">The adoption of multisensor wearables presents the opportunity of longitudinal monitoring of sleep in large populations. …”
-
102
Implementation and Comparison of Particle Swarm Optimization and Genetic Algorithm Techniques in Combined Economic Emission Dispatch of an Independent Power Plant
Published 2019“…<div><p>This paper presents the optimization of fuel cost, emission of NOX, COX, and SOX gases caused by the generators in a thermal power plant using penalty factor approach. …”
-
103
Use data Mining Techniques to Predict Users’ Engagement on the Social Network Posts in The Period Before, During and After Ramadan
Published 2017“…In contrast to traditional approaches on this topic, this dissertation seeks to analyze the depth of users’ engagement with social media posts and discuss the basis for a predictive model that to predict the total engagement of a post before publishing. At the beginning, a data set was collected from Crowdbabble online tool and the collected dataset presented different periods and different social media networks to examine the user behavior at different times. …”
Get full text
-
104
Autonomous 3D Deployment of Aerial Base Stations in Wireless Networks with User Mobility
Published 2019Get full text
Get full text
Get full text
Get full text
conferenceObject -
105
-
106
Parallel implementation of clique partitioning using artificial neural networks. (c2000)
Published 2000Get full text
Get full text
masterThesis -
107
Nonlinear analysis of shell structures using image processing and machine learning
Published 2023“…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …”
-
108
Scatter search for protein structure prediction. (c2008)
Published 2008Get full text
Get full text
masterThesis -
109
Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform
Published 2022“…<p dir="ltr">This paper presents a privacy persevering framework for a decentralized stock exchange platform, ensuring anonymity and unlinkability of the investors’ accounts and their respective trading activities. …”
-
110
A parallel ant colony optimization to globally optimize area in high-level synthesis. (c2011)
Published 2011Get full text
Get full text
masterThesis -
111
A Hybrid Fault Detection and Diagnosis of Grid-Tied PV Systems: Enhanced Random Forest Classifier Using Data Reduction and Interval-Valued Representation
Published 2021“…The proposed approach deals with system uncertainties (current/voltage variability, noise, measurement errors, ⋯) by using an interval-valued data representation, and with large-scale systems by using a dataset size-reduction framework. …”
-
112
Machine Learning Approach for the Design of an Assessment Outcomes Recommendation System
Published 2021“…A modern algorithm was improvised for this reason. For our proposed recommendation system, a database program was created to store data and include details in the analysis of course learning outcomes. …”
Get full text
Get full text
-
113
From low-cost sensors to high-quality data: A summary of challenges and best practices for effectively calibrating low-cost particulate matter mass sensors
Published 2021“…We also present a set of best practices to follow to obtain high-quality data from these low-cost sensors.…”
-
114
The use of multi-task learning in cybersecurity applications: a systematic literature review
Published 2024“…Cybersecurity has become vital in information technology, with data protection being a major priority. Despite government and corporate efforts, cybersecurity remains a significant concern. …”
-
115
IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture
Published 2025“…The IoMT sector deals with valuable, confidential healthcare-related data and offers convenient, personalized healthcare services. …”
-
116
-
117
Information warfare recovery-fighting back through the matrix. (c2012)
Published 2012Get full text
Get full text
masterThesis -
118
-
119
A synchronous/asynchronous multi-master replication method. (c2007)
Published 2007Get full text
Get full text
masterThesis -
120
Building power consumption datasets: Survey, taxonomy and future directions
Published 2020“…Accordingly, a novel visualization strategy based on using power consumption micro-moments has been presented along with an example of deploying machine learning algorithms to classify the micro-moment classes and identify anomalous power usage.…”