Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
search » research (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
search » research (Expand Search)
-
241
Recent advances on artificial intelligence and learning techniques in cognitive radio networks
Published 2015“…The literature survey is organized based on different artificial intelligence techniques such as fuzzy logic, genetic algorithms, neural networks, game theory, reinforcement learning, support vector machine, case-based reasoning, entropy, Bayesian, Markov model, multi-agent systems, and artificial bee colony algorithm. …”
Get full text
Get full text
Get full text
Get full text
article -
242
Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks
Published 2022“…This study proposes an analytical method based on sequential quadratic programming (SQP) methodology coupled with a mean value analysis (MVA) algorithm to solve this NP-Hard problem. Furthermore, a discrete event simulation (DES) model is developed to validate the optimisation of non-dominant solutions. …”
-
243
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
Published 2023“…Additionally, a clustering algorithm with a fuzzy membership function is implemented, allowing the robots to advance in accordance with predefined clusters and arrive at their starting place within a predetermined amount of time. …”
-
244
Blockchain-Based Decentralized Architecture for Software Version Control
Published 2023“…Smart contracts will be used to register developers, create blocks, and manage the repository. The suggested model is implemented using the Hyperledger Fabric network, and the developer and authorizer ends are built into the dotnet web application.…”
-
245
An optimization approach to increasing sustainability and enhancing resilience against environmental constraints in LNG supply chains: A Qatar case study
Published 2022“…The developed model, which is implemented using the Binary Particle Swarm Optimization algorithm subjected to economic and environmental objectives within an overarching strategic aim for sustainability and resilience. …”
-
246
Evolutionary support vector regression for monitoring Poisson profiles
Published 2023“…Little attention has been given to profile monitoring with non-normal response variables, known as general linear models which consists of two main categories (i.e., logistic and Poisson profiles). …”
-
247
Combined cycle gas turbine system optimization for extended range electric vehicles
Published 2020“…Recent studies explored the use of a Gas Turbine as the primary vehicle driver in a hybrid powertrain; however, none evaluated the implementation of a Combined Cycle Gas Turbine, which offers higher efficiency. …”
Get full text
Get full text
Get full text
Get full text
article -
248
-
249
The use of semantic-based predicates implication to improve horizontal multimedia database fragmentation
Published 2007“…We particularly discuss multimedia primary horizontal fragmentation and focus on semantic-based textual predicates implication required as a pre-process in current fragmentation algorithms in order to partition multimedia data efficiently. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
250
MSLP: mRNA subcellular localization predictor based on machine learning techniques
Published 2023“…</p><h3>Availability</h3><p dir="ltr">We have implemented a Docker container and API for end users to run their sequences on our model. …”
-
251
-
252
-
253
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
Published 2021“…The technology stack of the proposed solution was also implemented with four algorithms and eight protocols. …”
Get full text
-
254
Detection of statistically significant network changes in complex biological networks
Published 2017“…Moreover, the structure of the proposed algorithm allows for a faster parallelized implementation.…”
-
255
-
256
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
Published 2021“…This risk is specifically eminent in monitoring data transmission traffic, espionage, troop movement, border surveillance, searching, and warfare battlefield phenomenon, etc. …”
-
257
Diagnostic performance of artificial intelligence in detecting and subtyping pediatric medulloblastoma from histopathological images: A systematic review
Published 2025“…Two reviewers independently conducted study selection, data extraction, and risk of bias assessment. Results were synthesized narratively. …”
-
258
-
259
Modeling and Control of a Thermally Driven MEMS Actuator for RF Applications
Published 2017Get full text
doctoralThesis -
260
Combinatorial method for bandwidth selection in wind speed kernel density estimation
Published 2019“…This goal calls for devising probabilistic models with adaptive algorithms that accurately fit wind speed distributions. …”
Get full text