Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
implementing » implemented (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
implementing » implemented (Expand Search)
-
281
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
Published 2023“…In this system, a combination of unique and intelligent mechanisms are implemented to ensure the security of smart city networks. …”
-
282
Unlocking new frontiers in epilepsy through AI: From seizure prediction to personalized medicine
Published 2025“…This review examines AI’s transformative potential, its current limitations, and the multidisciplinary initiatives driving its effective implementation in epilepsy care.</p><h2>Other Information</h2> <p> Published in: Epilepsy & Behavior<br> License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1016/j.yebeh.2025.110327" target="_blank">https://dx.doi.org/10.1016/j.yebeh.2025.110327</a></p>…”
-
283
Turbo-charging dominating set with an FPT subroutine
Published 2017“…Turbo-charging is a recent algorithmic technique that is based on the fixed-parameter tractability of the dynamic versions of some problems as a way to improve heuristics. …”
Get full text
Get full text
Get full text
conferenceObject -
284
Collision-Free Autonomous Navigation Solution for Mobile Wheeled
Published 2023Get full text
doctoralThesis -
285
Multigrid solvers in reconfigurable hardware. (c2006)
Published 2006Get full text
Get full text
masterThesis -
286
Optimizing clopidogrel dose response
Published 2016“…A clinical-pharmacogenetic algorithm was developed based on whether clopidogrel shows 1) expected effect as per indication, 2) little or no effect, or 3) clinical features that patients experience and fit with clopidogrel adverse drug reactions. …”
Get full text
Get full text
Get full text
Get full text
article -
287
Reinforcement R-learning model for time scheduling of on-demand fog placement
Published 2020“…Our model aims to decrease the cloud’s load by utilizing the maximum available fogs resources over different locations. An implementation of our proposed R-learning model is provided in the paper, followed by a series of experiments on a real dataset to prove its efficiency in utilizing fog resources and minimizing the cloud’s load. …”
Get full text
Get full text
Get full text
Get full text
article -
288
Software tool for regression testing. (c1997)
Published 1997Get full text
Get full text
masterThesis -
289
Solution of Fractional Differential Equations: Transform and Iterative Methods Approach
Published 2019Get full text
doctoralThesis -
290
Blockchain-Based Decentralized Architecture for Software Version Control
Published 2023“…The proof of authority (PoA) consensus algorithm will be used to approve the developer communicating modifications to the private blockchain network; the authority will only provide permission and will not be able to add, edit, or delete code files. …”
-
291
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
Published 2019“…Meaning no “perfect” machine learning algorithm that will produce good results at particular problem, in fact for each type of problem a specific algorithm is suited and might achieves good outcome, while another algorithm fails heavily. …”
Get full text
-
292
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
Published 2010“…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
Get full text
-
293
Measuring ripple effect for object-oriented programs. (c2004)
Published 2004Get full text
Get full text
masterThesis -
294
Recent Advances in Harris Hawks Optimization: A Comparative Study and Applications
Published 2022“…In this review research, we focused on the applications and developments of the recent well-established robust optimizer Harris hawk optimizer (HHO) as one of the most popular swarm-based techniques of 2020. Moreover, several experiments were carried out to prove the powerfulness and effectivness of HHO compared with nine other state-of-art algorithms using Congress on Evolutionary Computation (CEC2005) and CEC2017. …”
Get full text
-
295
LOCATING DAMAGES IN THIN ALUMINIUM PLATES USING LAMB WAVES AND AGENETIC OPTIMIZATION APPROACH
Published 2021“…A new damage localization method based on Lamb waves is presented here for thin aluminium (Al) plate specimens using a Genetic optimization (GO) approach. …”
Get full text
-
296
“Adaptive Control Technique Using Multilayer Feedforward Neural Networks”
Published 2005“…This paper presents a new method for implementing adaptive controllers using multilayer feedforward neural networks (MFNN). …”
Get full text
article -
297
Clustering records in information retrieval systems. (c1995)
Published 1995Get full text
Get full text
masterThesis -
298
COMPUTER AIDED PROGRAMMING EDUCATION (CAPE)
Published 2020“…CAPE consists of problem definition and algorithm construction modules. Algorithm construction module is currently supported with a facility to map an algorithm(s) into FORTRAN or Pascal code. …”
Get full text
article -
299
Inception voltage of corona in bipolar ionized fields-effect oncorona power loss
Published 1996“…In this paper, an iterative finite element based algorithm is presented as a numerical tool for the solution of the bipolar ionized field around high voltage direct current (HVDC) transmission lines. …”
Get full text
Get full text
article -
300
On Indefinite Quadratic Optimization over the Intersection of Balls and Linear Constraints
Published 2022“…To solve e-TRS, we use the alternating direction method of multipliers approach and a branch and bound algorithm. Numerical experiments show the efficiency of the proposed approach compared to the CVX and the extended adaptive ellipsoid-based algorithm.…”