Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
system » systems (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
system » systems (Expand Search)
-
801
Detecting and Predicting Archaeological Sites Using Remote Sensing and Machine Learning—Application to the Saruq Al-Hadid Site, Dubai, UAE
Published 2023“…The validation of these results was performed using previous archaeological works as well as geological and geomorphological field surveys. The modelling and prediction accuracies are expected to improve with the insertion of a neural network and backpropagation algorithms based on the performed cluster groups following more recent field surveys. …”
Get full text
article -
802
Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects
Published 2023“…Insufficient knowledge and understanding of AI, data management and integration issues, legal and regulatory hurdles, financial considerations, reluctance to change, and interoperability issues all hinder AI system adoption and implementation. First, many engineering and construction specialists may not understand or use artificial intelligence. …”
Get full text
-
803
Unsupervised histogram based color image segmentation
Published 2003Get full text
Get full text
article -
804
Multi-Objective Optimization for Food Availability under Economic and Environmental Risk Constraints
Published 2024“…Utilizing these assessments, a multi-objective optimization model is developed and solved using MATLAB (R2018a)’s Genetic Algorithm, aiming to identify optimal suppliers to meet Qatar’s food demand, with consideration of the economic, environmental, and risk factors. …”
-
805
Predicting Compression Modes and Split Decisions for HEVC Video Coding Using Machine Learning Techniques
Published 2017Get full text
doctoralThesis -
806
-
807
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
808
DASSI: differential architecture search for splice identification from DNA sequences
Published 2022“…The demand for robust algorithms over the recent years has brought huge success in the field of Deep Learning (DL) in solving many difficult tasks in image, speech and natural language processing by automating the manual process of architecture design. …”
-
809
Heuristics for graph decomposition
Published 2000Get full text
Get full text
Get full text
Get full text
conferenceObject -
810
Multilayer perceptron-based DFE with lattice structure
Published 2001“…The drawback of the MLP-based equalizers is, however, their slow rate of convergence, which limit their use in practical systems. In this work, the effect of whitening the input data in a multilayer perceptron-based decision feedback equalizer (DFE) is evaluated. …”
article -
811
Multilayer perceptron-based DFE with lattice structure
Published 2001“…The drawback of the MLP-based equalizers is, however, their slow rate of convergence, which limit their use in practical systems. In this work, the effect of whitening the input data in a multilayer perceptron-based decision feedback equalizer (DFE) is evaluated. …”
Get full text
Get full text
article -
812
On the P-type learning control
Published 1994Get full text
Get full text
Get full text
Get full text
article -
813
Uplink Noma in UAV-Assisted IoT Networks
Published 2022“…Given the complexity of the problem and the incomplete knowledge about the environment, the problem is divided into two subproblems: the first models the UAV trajectory and the selection of the first device in the NOMA cluster at each time slot as a Markov Decision Process, and uses Proximal Policy Optimization to solve it. The second device is then selected using a heuristic algorithm based on prioritizing devices with higher bit rate requirements and strict deadlines. …”
Get full text
Get full text
Get full text
masterThesis -
814
-
815
A MIMO Sampling-Rate-Dependent Controller
Published 2014“…A sampling-rate-dependent (SRD) controller is proposed for the uniform output tracking problem of multiinput multioutput discrete time-varying linear systems. A proportional-integral-derivative (PID) controller is a special case of the proposed controller. …”
Get full text
Get full text
Get full text
Get full text
article -
816
Theory of P-type learning control with implication for the robot manipulator
Published 1993Get full text
Get full text
Get full text
Get full text
conferenceObject -
817
Artificial Intelligence for Skin Cancer Detection: Scoping Review
Published 2021“…</p><h3>Conclusions</h3><p dir="ltr">This paper examined multiple AI-based skin cancer detection models. However, a direct comparison between methods was hindered by the varied use of different evaluation metrics and image types. …”
-
818
-
819
Clustering and Stochastic Simulation Optimization for Outpatient Chemotherapy Appointment Planning and Scheduling
Published 2022“…A Stochastic Discrete Simulation-Based Multi-Objective Optimization (SDSMO) model is developed and linked to clustering algorithms using an iterative sequential approach. The experimental results indicate the positive effect of clustering similar appointments on the performance measures and the computational time. …”
-
820
The role of Reinforcement Learning in software testing
Published 2023“…</p><h3>Results</h3><p dir="ltr">This study highlights different software testing types to which RL has been applied, commonly used RL algorithms and architecture for learning, challenges faced, advantages and disadvantages of using RL, and the performance comparison of RL-based models against other techniques.…”