Showing 141 - 160 results of 366 for search '(((( element method algorithm ) OR ( based solution algorithm ))) OR ( neural finding algorithm ))', query time: 0.13s Refine Results
  1. 141
  2. 142

    An efficient failure-resilient mutual exclusion algorithm for distributed systems leveraging a novel zero-message overlay structure by Mouna Rabhi (17086969)

    Published 2024
    “…<p>In this paper, we provide a novel failure-resilient token-based mutual exclusion (ME) algorithm for distributed systems. …”
  3. 143

    Stochastic optimal power flow framework with incorporation of wind turbines and solar PVs using improved liver cancer algorithm by Noor Habib Khan (22224775)

    Published 2024
    “…To avoid such issues and provide the optimal solution, there are some modifications are implemented into the internal structure of t‐LCA based on Weibull flight operator, mutation‐based approach, quasi‐opposite‐based learning and gorilla troops exploitation‐based mechanisms to enhance the overall strength of the algorithm to obtain the global solution. …”
  4. 144
  5. 145

    New Hardware Algorithms and Designs for Montgomery Modular Inverse Computation in Galois Fields GF(p) and GF(2n) by Gutub, Adnan

    Published 2002
    “…We compare all scalable designs with fully parallel ones based on the same basic inversion algorithm. All scalable designs consumed less area and in general showed better performance than the fully parallel ones, which makes the scalable design a very efficient solution for computing the long precision Montgomery inverse.…”
    Get full text
    Get full text
    masterThesis
  6. 146
  7. 147

    Bird’s Eye View feature selection for high-dimensional data by Samir Brahim Belhaouari (16855434)

    Published 2023
    “…This approach is inspired by the natural world, where a bird searches for important features in a sparse dataset, similar to how a bird search for sustenance in a sprawling jungle. BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …”
  8. 148
  9. 149

    Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT by Arumugam K (18456690)

    Published 2021
    “…Additionally, by introducing the authentication mechanism based on transfer learning, blockchains can enhance the preservation and security standards for industrial applications. …”
  10. 150

    Nonlinear analysis of shell structures using image processing and machine learning by M.S. Nashed (16392961)

    Published 2023
    “…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …”
  11. 151
  12. 152
  13. 153
  14. 154

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method by Amit Kumar Balyan (18288964)

    Published 2022
    “…To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …”
  15. 155

    Severity-Based Prioritized Processing of Packets with Application in VANETs by Ala Al-Fuqaha (4434340)

    Published 2019
    “…The proposed heuristic is tested against the PMKP solution and results show a small degradation of up to 4 percent in profit for the heuristic compared to the PMKP solution. …”
  16. 156
  17. 157
  18. 158
  19. 159

    Distributed optimal coverage control in multi-agent systems: Known and unknown environments by Mohammadhasan Faghihi (22303057)

    Published 2024
    “…The proposed technique offers an optimal solution with a lower cost with respect to conventional Voronoi-based techniques by effectively handling the issue of agents remaining stationary in regions void of information using a ranking function. …”
  20. 160