Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
-
541
Starvation Problem in CPU Scheduling for Multimedia Systems
Published 2002“…Multimedia applications have timing requirements that cannot generally be satisfied using the time-sharing algorithms of general-purpose operating systems. …”
Get full text
article -
542
Optimising Nurse–Patient Assignments: The Impact of Machine Learning Model on Care Dynamics—Discursive Paper
Published 2025“…Future research should focus on refining algorithms, ensuring real‐time adaptability, addressing ethical considerations, evaluating long‐term patient outcomes, fostering cooperative systems, and integrating relevant data and policies within the healthcare framework.…”
-
543
Positive Unlabelled Learning to Recognize Dishes as Named Entity
Published 2019“…I work with Yelp dataset, going through each text review, using each noun as a candidate, label the positive samples using the aforementioned lookup table, then using Positive Unlabelled learning techniques to recognise more entities within the unlabelled data, by predicting the probability for each candidate. …”
Get full text
-
544
NEURAL NETWORK MODEL FOR PLANNED REPLACEMENT OF BOEING 737 BRAKES
Published 2020“…Three years of data are used for model building and validation. …”
Get full text
article -
545
A novel hybrid methodology for fault diagnosis of wind energy conversion systems
Published 2023“…Therefore, a hybrid feature selection based diagnosis technique, that can preserve the advantages of wrapper and filter algorithms as well as RF model, is proposed. In the first phase, the neighborhood component analysis (NCA) filter algorithm is used to reduce and select only the pertinent features from the original raw data. …”
-
546
Multi Agent Reinforcement Learning Approach for Autonomous Fleet Management
Published 2019Get full text
doctoralThesis -
547
Enhanced DC Microgrid Protection: a Neural Network and Wavelet Transform Approach
Published 2024Get full text
doctoralThesis -
548
-
549
-
550
Multi-UAV-Enabled Mobile Edge Computing IoT Systems: Joint Association and Resource Allocation Framework
Published 2024Get full text
doctoralThesis -
551
FAILURE RATE ANALYSIS OF BOEING 737 BRAKES EMPLOYING NEURAL NETWORK
Published 2007“…Three years of data are used for model building and validation. …”
Get full text
article -
552
An Improved Genghis Khan Optimizer based on Enhanced Solution Quality Strategy for Global Optimization and Feature Selection Problems
Published 2024“…The primary goals of feature selection are to decrease the number of dimensions and enhance classification accuracy in many domains, such as text classification, large-scale data analysis, and pattern recognition. Several metaheuristics, such as the Genghis Khan Shark Optimizer Algorithm (GKSO), can assist in optimizing the FS issue. …”
Get full text
-
553
Competitive learning/reflected residual vector quantization for coding angiogram images
Published 2003“…Medical images need to be compressed for the purpose of storage/transmission of a large volume of medical data. Reflected residual vector quantization (RRVQ) has emerged recently as one of the computationally cheap compression algorithms. …”
Get full text
Get full text
article -
554
Severity-Based Prioritized Processing of Packets with Application in VANETs
Published 2019“…In this study, we propose a generic prioritization and resource management algorithm that can be used to prioritize processing of received packets in vehicular networks. …”
-
555
Low Cost Autopilot Design Using Fuzzy Supervisory Control
Published 2005Get full text
doctoralThesis -
556
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
Published 2021“…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…”
-
557
Information Warfare
Published 2015“…The algorithm is based on data dependency and uses a single matrix that will be later used during recovery.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
558
Edge Caching in Fog-Based Sensor Networks through Deep Learning-Associated Quantum Computing Framework
Published 2022“…After selecting the most appropriate lattice map (32 × 32) in 750,000 iterations using SOMs, the data points below the dark blue region are mapped onto the data frame to get the videos. …”
-
559
Scatter search for homology modeling
Published 2016“…The metaheuristic optimizes the initial poor alignments and uses fitness functions. We assess our algorithm on a number of proteins whose structures are present in the Protein Data Bank and which have been used in previous literature. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
560
Video features with impact on user quality of experience
Published 2021“…The feature evaluation is performed first using forward elimination feature selection algorithm, and second using decision tree classification to extract and sort the features that highly affect the subjective QoE. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject