Search alternatives:
modelling algorithm » scheduling algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
multi algorithm » mould algorithm (Expand Search), auction algorithm (Expand Search)
modelling algorithm » scheduling algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
multi algorithm » mould algorithm (Expand Search), auction algorithm (Expand Search)
-
161
Sentiment visualization of correlation of loneliness mapped through social intelligence analysis
Published 2024“…Social media platforms have become a valuable source of data to study this phenomenon.</p><h3>Objectives</h3><p dir="ltr">This paper aims to visualize the frequency of loneliness-related themes and topics in Twitter data. …”
-
162
Energy-Efficient VoI-Aware UAV-Assisted Data Collection in Wireless Sensor Networks
Published 2025“…To address these objectives, our proposed approach incorporates deep reinforcement learning (RL-DQN) techniques to optimize UAV deployment, minimizing the number of UAVs while maximizing the number of successfully collected SNs with non-redundant data. The model considers VoI and energy constraints of the SNs, enhancing both efficiency and sustainability. …”
Get full text
Get full text
Get full text
masterThesis -
163
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
Published 2024“…Exploratory Data Analysis (EDA) highlights the class imbalance problem in detecting fake jobs, which tends the model to act aggressively toward the minority class. …”
-
164
-
165
Prediction of pressure gradient for oil-water flow: A comprehensive analysis on the performance of machine learning algorithms
Published 2022“…While the previous studies mostly used ANN to demonstrate the capability of MLs to predict PG over the mechanistic or correlation-based models, the present research has shown that GP is even better than ANN using a wide range of FPs and a large data set.…”
-
166
Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem
Published 2016“…This research note describes Response-Based Unit Segmentation (REBUS), a “latent class detection” technique used in partial least squares–structural equation modeling (PLS-SEM) to examine data heterogeneity. The research note is presented in two parts: Part A presents an overview of REBUS, including its development, algorithm, and its primary functions. …”
Get full text
Get full text
Get full text
Get full text
article -
167
Portfolio Selection Problem Using CVaR Risk Measures Equipped with DEA, PSO, and ICA Algorithms
Published 2022“…It was found that when solving the Mean-CVaR model with evolutionary algorithms, the risk decreased. …”
-
168
A Comprehensive Review of Digital Twin Technology in Building Energy Consumption Forecasting
Published 2024“…The digitalization of building energy forecasting systems, enhanced by Energy Digital Twin technology alongside IoT devices and advanced data-driven algorithms, offers substantial improvements in energy management and optimization, servicing, maintenance, and energy-efficient design. …”
-
169
Digital twin in energy industry: Proposed robust digital twin for power plant and other complex capital-intensive large engineering systems
Published 2022“…Furthermore, this paper demonstrates the advantages of the developed ADL algorithm approach and DSM prediction of the DT using vector autoregressive model for anomaly detection in utility gas turbines with data from an operational power plant.…”
-
170
-
171
Hardware Model of an Expandable RSA Cryptographic System
Published 1998“…Data security is an important aspect of information transmission and storage in an electronic form. …”
Get full text
Get full text
Get full text
masterThesis -
172
Socially Motivated Approach to Simulate Negotiation Process
Published 2014Get full text
doctoralThesis -
173
A Framework for Predictive Modeling in Sustainable Projects
Published 2012Get full text
doctoralThesis -
174
-
175
Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques
Published 2020“…The obtained results illustrate the efficacy of the proposed algorithm to analyze the time series data from the IoT devices for spam detection.…”
-
176
-
177
-
178
A Blockchain Model for Secure Communications in Internet of Vehicles
Published 2021“…In this paper, we present a framework for secure IoV communications by utilizing the High Performance Blockchain Consensus (HPBC) algorithm. Based on a previously published communication model for VANETs that uses an efficient routing protocol for transmitting packets between vehicles, we describe in this paper how to integrate a blockchain model on top of the IoV communications system. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
179
A Hardware Model of an Expandable RSA Cryptogrsphic System
Published 1998“…Data security is an important aspect of information transmission and storage in an electronic form. …”
Get full text
masterThesis -
180
Use data Mining Techniques to Predict Users’ Engagement on the Social Network Posts in The Period Before, During and After Ramadan
Published 2017“…Different classification algorithms were applied to the dataset using the Rapidminer tool. …”
Get full text