Search alternatives:
custom algorithm » control algorithm (Expand Search), auction algorithm (Expand Search), cosine algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
agents based » agent based (Expand Search), event based (Expand Search)
custom algorithm » control algorithm (Expand Search), auction algorithm (Expand Search), cosine algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
agents based » agent based (Expand Search), event based (Expand Search)
-
21
Optimized FPGA Implementation of PWAM-Based Control of Three—Phase Nine—Level Quasi Impedance Source Inverter
Published 2019“…Since, PWAM control algorithm is more complex than PSCPWM, FPGA based implementation for PWAM control is discussed. …”
-
22
-
23
StackDPPred: Multiclass prediction of defensin peptides using stacked ensemble learning with optimized features
Published 2024“…Defensins are the type of AMPs that act as potential therapeutic drug agent and perform vital role in various biological process. …”
-
24
Bird’s Eye View feature selection for high-dimensional data
Published 2023“…BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …”
-
25
Sensitivity analysis and genetic algorithm-based shear capacity model for basalt FRC one-way slabs reinforced with BFRP bars
Published 2023“…Finally, a design equation that can predict the shear capacity of one-way BFRC-BFRP slabs was proposed based on genetic algorithm. The proposed model showed the best prediction accuracy compared to the available design codes and guidelines with a mean of predicted to experimental shear capacities (V<sub>pred</sub>/V<sub>exp</sub>) ratio of 0.97 and a coefficient of variation of 17.91%.…”
-
26
-
27
A Hybrid Deep Learning Model Using CNN and K-Mean Clustering for Energy Efficient Modelling in Mobile EdgeIoT
Published 2023“…The proposed method, existing weighted clustering algorithm (WCA), and agent-based secure enhanced performance approach (AB-SEP) are tested over the network dataset. …”
-
28
Towards a Unified Arabic Government Services Chatbot Based on Ontology
Published 2020“…These results confirmed that the performance of the proposed algorithm could outperform both a previously developed chatbot-based on ontology and Rashid chatbot as well.…”
Get full text
-
29
-
30
-
31
Edge Caching in Fog-Based Sensor Networks through Deep Learning-Associated Quantum Computing Framework
Published 2022“…Firstly, the DL agent prioritizes caching contents via self organizing maps (SOMs) algorithm, and secondly, the prioritized contents are stored in QMM using a Two-Level Spin Quantum Phenomenon (TLSQP). …”
-
32
CoLoSSI: Multi-Robot Task Allocation in Spatially-Distributed and Communication Restricted Environments
Published 2024“…We propose a cooperative, load-balancing task allocation and scheduling algorithm based on sequential single-item auctions (CoLoSSI) that explicitly considers the non-atomicity of tasks, promotes synergies between agents, and enables cooperation while maintaining computational tractability. …”
-
33
-
34
Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature
Published 2022“…MethodsA systematic review of cases of extremity ischemia and necrosis after envenomation by marine cnidarians was performed to clarify what is and what is not known about management and outcomes, to draw conclusions about how best to manage these rare presentations, and to establish an evidence-based algorithm. ResultsThe ischemic sequelae of envenomation typically evolves over a few days. …”
Get full text
Get full text
Get full text
article -
35
Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature
Published 2022“…</p><h3>Methods</h3><p dir="ltr">A systematic review of cases of extremity ischemia and necrosis after envenomation by marine cnidarians was performed to clarify what is and what is not known about management and outcomes, to draw conclusions about how best to manage these rare presentations, and to establish an evidence-based algorithm.</p><h3>Results</h3><p dir="ltr">The ischemic sequelae of envenomation typically evolves over a few days. …”
-
36
Autonomous Demand-Side Management in the Future Smart Grid
Published 2016Get full text
doctoralThesis -
37
Improving the security of SNMP in wireless networks
Published 2017“…SNMPv1 and v2 do not provide security when managing agents. Three very important security features (authentication, encryption, access control) are added to SNMPv3 under the user-based security model (USM). …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
38
Efficient Seismic Volume Compression using the Lifting Scheme
Published 2000“…Finally a runlength plus a Huffman encoding are applied for binary coding of the quantized coefficients.…”
Get full text
article -
39
Developing a Cooperative Behavior for Multi Agents System Application to Robot Soccer
Published 2007Get full text
doctoralThesis -
40
Multigrid solvers in reconfigurable hardware. (c2006)
Published 2006Get full text
Get full text
masterThesis