Search alternatives:
learning algorithm » learning algorithms (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
learning algorithm » learning algorithms (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
-
21
A Parallel Neural Networks Algorithm for the Clique Partitioning Problem
Published 2002“…A parallel simulator, based on PVM, was implemented for the proposed algorithm on a Linux Cluster. …”
Get full text
Get full text
article -
22
A FUZZY EVOLUTIONARY ALGORITHM FOR TOPOLOGY DESIGN OF CAMPUS NETWORKS
Published 2020“…To intensify the search, we have also incorporated Tabu Search-based characteristics in the allocation phase of the SE algorithm. …”
Get full text
article -
23
Evolutionary algorithms for state justification in sequential automatic test pattern generation
Published 2005“…A common search operation in sequential Automatic Test Pattern Generation is to justify a desired state assignment on the sequential elements. State justification using deterministic algorithms is a difficult problem and is prone to many backtracks, which can lead to high execution times. …”
Get full text
article -
24
A New Hamiltonian Semi-Analytical Approach to Vibration Analysis of Piezoelectric Multi-Layered Plates
Published 2024“…The obtained results are verified by comparison with published ones based on conventional approaches.…”
Get full text
article -
25
Topology design of switched enterprise networks using a fuzzy simulated evolution algorithm
Published 2020“…In this paper, we present an approach based on Simulated Evolution algorithm for the design of SEN topology. …”
Get full text
article -
26
Topology design of switched enterprise networks using a fuzzy simulated evolution algorithm
Published 2020“…In this paper, we present an approach based on Simulated Evolution algorithm for the design of SEN topology. …”
Get full text
article -
27
Optimized FPGA Implementation of PWAM-Based Control of Three—Phase Nine—Level Quasi Impedance Source Inverter
Published 2019“…Since, PWAM control algorithm is more complex than PSCPWM, FPGA based implementation for PWAM control is discussed. …”
-
28
A Novel BIPV Reconfiguration Algorithm for Maximum Power Generation under Partial Shading
Published 2020“…The system is optimised for maximum yield to determine the optimal configuration and number of modules for each string using a genetic algorithm. The outcomes from the algorithm are based on clustering the solar insolation values and then applying a genetic algorithm optimisation to indicate the optimum BIPV array layout for maximum yield.…”
-
29
-
30
A reduced model for phase-change problems with radiation using simplified PN approximations
Published 2025“…To solve the coupled equations, we implement a second-order implicit scheme for the time integration and a mixed finite element method for the space discretization. A Newton-based algorithm is also adopted for solving the nonlinear systems resulting from the considered monolithic approach. …”
Get full text
article -
31
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
32
Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study
Published 2021“…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …”
Get full text
article -
33
The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions
Published 2022“…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
-
34
Analysis of Multi-User-Based UAV System With Outdated CSI
Published 2024“…Optimization of UAV location and altitude is performed through a limited-memory Broyden-Fletcher-Goldfarb-Shanno (LBFGS) algorithm to attain minimum OP (MOP). Results illustrate optimal performance dependent on the channel correlation parameters, antenna elements, and fading conditions. …”
-
35
-
36
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
Published 2024“…As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. There are many machine-learning and deep-learning algorithms have been developed by researchers. …”
-
37
Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants
Published 2024“…It also provides implications for tech-managers and algorithm designers to build effective voice technology for superior user experience.…”
-
38
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
Published 2015“…First, our approach resolves the complexity of policies by elaborating an intermediate set-based representation to which the elements of XACML are automatically converted. …”
Get full text
Get full text
Get full text
article -
39
Approximate XML structure validation based on document–grammar tree similarity
Published 2015“…Our approach exploits the concept of tree edit distance, introducing a novel edit distance recurrence and dedicated algorithms to effectively compare XML documents and grammar structures, modeled as ordered labeled trees. …”
Get full text
Get full text
Get full text
Get full text
article -
40