Showing 21 - 40 results of 63 for search '(((( elements custom algorithm ) OR ( agents based algorithm ))) OR ( level coding algorithm ))', query time: 0.12s Refine Results
  1. 21

    Optimized FPGA Implementation of PWAM-Based Control of Three—Phase Nine—Level Quasi Impedance Source Inverter by Syed Rahman (569240)

    Published 2019
    “…Since, PWAM control algorithm is more complex than PSCPWM, FPGA based implementation for PWAM control is discussed. …”
  2. 22
  3. 23

    StackDPPred: Multiclass prediction of defensin peptides using stacked ensemble learning with optimized features by Muhammad Arif (769250)

    Published 2024
    “…Defensins are the type of AMPs that act as potential therapeutic drug agent and perform vital role in various biological process. …”
  4. 24

    Bird’s Eye View feature selection for high-dimensional data by Samir Brahim Belhaouari (16855434)

    Published 2023
    “…BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …”
  5. 25

    Sensitivity analysis and genetic algorithm-based shear capacity model for basalt FRC one-way slabs reinforced with BFRP bars by Abathar Al-Hamrani (16494884)

    Published 2023
    “…Finally, a design equation that can predict the shear capacity of one-way BFRC-BFRP slabs was proposed based on genetic algorithm. The proposed model showed the best prediction accuracy compared to the available design codes and guidelines with a mean of predicted to experimental shear capacities (V<sub>pred</sub>/V<sub>exp</sub>) ratio of 0.97 and a coefficient of variation of 17.91%.…”
  6. 26
  7. 27

    A Hybrid Deep Learning Model Using CNN and K-Mean Clustering for Energy Efficient Modelling in Mobile EdgeIoT by Dhananjay Bisen (19482454)

    Published 2023
    “…The proposed method, existing weighted clustering algorithm (WCA), and agent-based secure enhanced performance approach (AB-SEP) are tested over the network dataset. …”
  8. 28

    Towards a Unified Arabic Government Services Chatbot Based on Ontology by Areed, Sufyan

    Published 2020
    “…These results confirmed that the performance of the proposed algorithm could outperform both a previously developed chatbot-based on ontology and Rashid chatbot as well.…”
    Get full text
  9. 29
  10. 30
  11. 31

    Edge Caching in Fog-Based Sensor Networks through Deep Learning-Associated Quantum Computing Framework by Tayyabah Hasan (18427887)

    Published 2022
    “…Firstly, the DL agent prioritizes caching contents via self organizing maps (SOMs) algorithm, and secondly, the prioritized contents are stored in QMM using a Two-Level Spin Quantum Phenomenon (TLSQP). …”
  12. 32

    CoLoSSI: Multi-Robot Task Allocation in Spatially-Distributed and Communication Restricted Environments by Ishaq Ansari (22047902)

    Published 2024
    “…We propose a cooperative, load-balancing task allocation and scheduling algorithm based on sequential single-item auctions (CoLoSSI) that explicitly considers the non-atomicity of tasks, promotes synergies between agents, and enables cooperation while maintaining computational tractability. …”
  13. 33
  14. 34

    Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature by Saif, Badran

    Published 2022
    “…MethodsA systematic review of cases of extremity ischemia and necrosis after envenomation by marine cnidarians was performed to clarify what is and what is not known about management and outcomes, to draw conclusions about how best to manage these rare presentations, and to establish an evidence-based algorithm. ResultsThe ischemic sequelae of envenomation typically evolves over a few days. …”
    Get full text
    Get full text
    Get full text
    article
  15. 35

    Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature by Saif Badran (16888785)

    Published 2022
    “…</p><h3>Methods</h3><p dir="ltr">A systematic review of cases of extremity ischemia and necrosis after envenomation by marine cnidarians was performed to clarify what is and what is not known about management and outcomes, to draw conclusions about how best to manage these rare presentations, and to establish an evidence-based algorithm.</p><h3>Results</h3><p dir="ltr">The ischemic sequelae of envenomation typically evolves over a few days. …”
  16. 36
  17. 37

    Improving the security of SNMP in wireless networks by Otrok, H.

    Published 2017
    “…SNMPv1 and v2 do not provide security when managing agents. Three very important security features (authentication, encryption, access control) are added to SNMPv3 under the user-based security model (USM). …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  18. 38

    Efficient Seismic Volume Compression using the Lifting Scheme by Khene, M. F.

    Published 2000
    “…Finally a runlength plus a Huffman encoding are applied for binary coding of the quantized coefficients.…”
    Get full text
    article
  19. 39
  20. 40