Search alternatives:
software algorithm » swarm algorithm (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
client modeling » agent modeling (Expand Search), event modeling (Expand Search)
deer algorithm » search algorithm (Expand Search)
element deer » elementi per (Expand Search)
Showing 1 - 20 results of 24 for search '(((( element deer algorithm ) OR ( element software algorithm ))) OR ( client modeling algorithm ))', query time: 0.12s Refine Results
  1. 1

    Intelligent Bilateral Client Selection in Federated Learning Using Game Theory by Wehbi, Osama

    Published 2022
    “…Based on our simulation findings, our strategy surpasses the VanillaF selection approach in terms of maximizing both the revenues of the client devices and accuracy of the global federated learning model.…”
    Get full text
    Get full text
    Get full text
    masterThesis
  2. 2

    Adaptive Federated Learning Architecture To Mitigate Non-IID Through Multi-Objective GA-Based Efficient Client Selection by Ajaj, Mohamad

    Published 2024
    “…Existing solutions still have several constraints leading to suboptimal model performance and slow convergence. In this paper, we propose a novel approach that incorporates genetic algorithms with an enhanced client selection strategy, utilizing client metadata rather than raw data. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  3. 3
  4. 4

    Nonlinear analysis of shell structures using image processing and machine learning by M.S. Nashed (16392961)

    Published 2023
    “…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …”
  5. 5

    Development of an Optimization Algorithm for Internet Data Traffic by Misbahuddin, Syed

    Published 2020
    “…Furthermore, as the proposed algorithm works at IP datagrams only, therefore, it remains transparent from all client-server applications.…”
    Get full text
    article
  6. 6

    Algorithmic Study of Online Multi-Facility Location Problems by Markarian, Christine

    Published 2022
    “…The aim of the algorithm is then to provide a robust service to all clients while minimizing the total connecting and facility purchasing costs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 7
  8. 8
  9. 9

    A Novel BIPV Reconfiguration Algorithm for Maximum Power Generation under Partial Shading by Saoud A. Al-Janahi (18877213)

    Published 2020
    “…The system is optimised for maximum yield to determine the optimal configuration and number of modules for each string using a genetic algorithm. The outcomes from the algorithm are based on clustering the solar insolation values and then applying a genetic algorithm optimisation to indicate the optimum BIPV array layout for maximum yield.…”
  10. 10

    Modeling and automated blackbox regression testing of web applications by Haraty, Ramzi

    Published 2008
    “…Motivated by the fact that there is no single model to represent the entire web application, and to model it from different perspectives at the same time, we propose a single analysis model with it testing techniques which models and tests the three poles of the web application: the client side pages navigated by the user, the server side programs executed at runtime, and the architectural environment hosting the application. …”
    Get full text
    Get full text
    Get full text
    article
  11. 11
  12. 12

    Multi-Objective Optimisation of Injection Moulding Process for Dashboard Using Genetic Algorithm and Type-2 Fuzzy Neural Network by Mohammad Reza Chalak Qazani (13893261)

    Published 2024
    “…Computational techniques, like the finite element method, are used to analyse behaviours based on varied input parameters. …”
  13. 13
  14. 14

    Exposure of Botnets in Cloud Environment by Expending Trust Model with CANFES Classification Approach by Nagendra Prabhu Selvaraj (17542041)

    Published 2022
    “…The goal is to be able to detect a larger range of bots and botnets by relying on several techniques called trust model. On this work, the port access verification in trust model is achieved by a Heuristic factorizing algorithm which verifies the port accessibility between client-end-user and client server. …”
  15. 15

    Acoustic Based Localization of Partial Discharge Inside Oil-Filled Transformers by Hamidreza Besharatifard (16904823)

    Published 2022
    “…<p dir="ltr">This paper addresses the localization of Partial Discharge through a 3D Finite Element Method analysis of acoustic wave propagation inside a 3-phase 35kV transformer with the help of COMSOL Multiphysics software. …”
  16. 16
  17. 17

    Design Optimization of Inductive Power Transfer Systems Considering Bifurcation and Equivalent AC Resistance for Spiral Coils by Alireza Namadmalan (16864236)

    Published 2020
    “…Based on the proposed algorithm, several IPT systems are optimized in MATLAB software using Genetic Algorithm (GA). …”
  18. 18
  19. 19
  20. 20