Showing 161 - 180 results of 958 for search '(((( implementing a algorithm ) OR ( element data algorithm ))) OR ( data using algorithm ))', query time: 0.13s Refine Results
  1. 161

    A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks by Umesh Kumar Lilhore (17727684)

    Published 2022
    “…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …”
  2. 162

    Integrating genetic algorithms, tabu search, and simulatedannealing for the unit commitment problem by Mantawy, A.H.

    Published 1999
    “…A new implementation of the genetic algorithm is introduced. …”
    Get full text
    Get full text
    article
  3. 163

    A new tabu search algorithm for the long-term hydro scheduling problem by Mantawy, A.H.

    Published 2002
    “…A new efficient algorithm to solve the long-term hydro scheduling problem (LTHSP) is presented in this paper. …”
    Get full text
    Get full text
    article
  4. 164

    Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques by Ameema Zainab (16864263)

    Published 2020
    “…The obtained results illustrate the efficacy of the proposed algorithm to analyze the time series data from the IoT devices for spam detection.…”
  5. 165

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method by Amit Kumar Balyan (18288964)

    Published 2022
    “…To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …”
  6. 166
  7. 167
  8. 168
  9. 169
  10. 170
  11. 171

    Use data Mining Techniques to Predict Users’ Engagement on the Social Network Posts in The Period Before, During and After Ramadan by AL RAWASHDEH, HANEEN MOHAMMAD

    Published 2017
    “…Different classification algorithms were applied to the dataset using the Rapidminer tool. …”
    Get full text
  12. 172

    The use of multi-task learning in cybersecurity applications: a systematic literature review by Shimaa Ibrahim (22155739)

    Published 2024
    “…Five critical applications, such as network intrusion detection and malware detection, were identified, and several tasks used in these applications were observed. Most of the studies used supervised learning algorithms, and there were very limited studies that focused on other types of machine learning. …”
  13. 173
  14. 174

    Integrating Genetic Algorithms, Tabu Search, And Simulated Annealing For The Unit Commitment Problem by Montawy, A.H.

    Published 2020
    “…A new implementation of the genetic algorithm is introduced. …”
    Get full text
    article
  15. 175
  16. 176

    Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT by Arumugam K (18456690)

    Published 2021
    “…This paper proposes an Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT. …”
  17. 177
  18. 178

    A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks by Saad, Walid

    Published 2012
    “…In this work, we propose a utility-based joint uplink/downlink scheduling algorithm suitable for wireless services involving pairwise communication among mobile users. …”
    Get full text
    Get full text
    Get full text
    article
  19. 179

    Correlation Clustering with Overlaps by Fakhereldine, Amin

    Published 2020
    “…Moreover, we allow the new vertex splitting operation, which allows the resulting clusters to overlap. In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  20. 180

    Boosting the visibility of services in microservice architecture by Ahmet Vedat Tokmak (17773479)

    Published 2023
    “…In this research, we evaluate the performance of several classification algorithms for estimating the quality of microservices using the QWS dataset containing traffic data of 2505 microservices. …”