بدائل البحث:
iot algorithm » rd algorithm (توسيع البحث)
per algorithm » deer algorithm (توسيع البحث), rd algorithm (توسيع البحث), search algorithm (توسيع البحث)
element per » elementi per (توسيع البحث)
implementing » implemented (توسيع البحث)
finding » findings (توسيع البحث)
iot algorithm » rd algorithm (توسيع البحث)
per algorithm » deer algorithm (توسيع البحث), rd algorithm (توسيع البحث), search algorithm (توسيع البحث)
element per » elementi per (توسيع البحث)
implementing » implemented (توسيع البحث)
finding » findings (توسيع البحث)
-
1
Improved Reptile Search Algorithm by Salp Swarm Algorithm for Medical Image Segmentation
منشور في 2023"…This study proposes a novel nature-inspired meta-heuristic optimizer based on the Reptile Search Algorithm combed with Salp Swarm Algorithm for image segmentation using gray-scale multi-level thresholding, called RSA-SSA. …"
احصل على النص الكامل
-
2
A multi-class discriminative motif finding algorithm for autosomal genomic data. (c2015)
منشور في 2016"…These discriminative motifs can be further studied to understand their role both at the evolutionary and disease levels.…"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
3
Minimizing Deadline Misses of Mobile IoT Requests in a Hybrid Fog- Cloud Computing Environment
منشور في 2019احصل على النص الكامل
doctoralThesis -
4
Adapted arithmetic optimization algorithm for multi-level thresholding image segmentation: a case study of chest x-ray images
منشور في 2023"…These techniques work well for bi-level thresholding, but when used to find the appropriate thresholds for multi-level thresholding, there will be issues with long calculation times, high computational costs, and the need for accuracy improvements. …"
احصل على النص الكامل
-
5
Meta-Heuristic Procedures for the Multi-Resource Leveling Problem with Activity Splitting
منشور في 2011احصل على النص الكامل
doctoralThesis -
6
Experimental Investigation and Comparative Evaluation of Standard Level Shifted Multi-Carrier Modulation Schemes With a Constraint GA Based SHE Techniques for a Seven-Level PUC Inv...
منشور في 2019"…Topology offers a reduced switch count solution with simple control strategy compared to the existing seven-level inverters. Different standard multicarrier sinusoidal pulse-width modulation techniques (SPWMs) are adapted for the generation of switching gate signals for the PUC power switches, and these SPWMs are compared with novel optimization-based selective harmonic elimination (SHE) that employs genetic algorithm (GA) for solving nonlinear SHE equation with a constraint that eliminated all third-order harmonics efficiently. …"
-
7
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
8
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …"
-
9
-
10
Isolating Physical Replacement of Identical IoT Devices Using Machine and Deep Learning Approaches
منشور في 2021احصل على النص الكامل
doctoralThesis -
11
ECG Signal Reconstruction on the IoT-Gateway and Efficacy of Compressive Sensing Under Real-Time Constraints
منشور في 2018"…<p dir="ltr">Remote health monitoring is becoming indispensable, though, Internet of Things (IoTs)-based solutions have many implementation challenges, including energy consumption at the sensing node, and delay and instability due to cloud computing. …"
-
12
Machine Learning Techniques for Detecting Attackers During Quantum Key Distribution in IoT Networks With Application to Railway Scenarios
منشور في 2021"…An architecture for implementing QKD in beyond 5G IoT networks is proposed, offloading the heavy computational tasks to IoT controllers. …"
-
13
The Role of KM in Enhancing AI Algorithms and Systems
منشور في 2020"…The current study shows the relation between KM processes and AI systems from a higher perspective, giving different options to apply other KM processes for the same AI algorithm to reduce any implementation challenges and enhance the adoption level. …"
احصل على النص الكامل
احصل على النص الكامل
-
14
MAESTRO: Orchestrating Computational Offloading to Multiple FemtoClouds in Various Communication Environments
منشور في 2022"…<p dir="ltr">Many novel IoT-based applications demand low latency, large compute resources, and high privacy. …"
-
15
Concurrent BIST Synthesis and Test Scheduling Using Genetic Algorithms
منشور في 2007"…The method is based on a genetic algorithm that efficiently explores the testable design space and finds a sub-optimal test registers assignment for each k-test session. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
16
-
17
-
18
Genetic Algorithm for Solving Site Layout Problem with Unequal-Size and Constrained Facilities
منشور في 2002"…The paper concludes with examples illustrating the strength and limitations of the proposed algorithm in the cases of ~1! loosely versus tightly constrained layouts with equal levels of interaction between facilities; ~2! …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
19
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
منشور في 2022"…A MATLAB simulation used to evaluate the new strategy, and the metrics obtained from that simulation are compared to those obtained from the older methods. According to the findings of several studies, the framework is significantly more effective than conventional methods in maintaining high levels of privacy. …"
احصل على النص الكامل
احصل على النص الكامل
-
20
Real-Time Selective Harmonic Mitigation Technique for Power Converters Based on the Exchange Market Algorithm
منشور في 2020"…The performance of the EMA-based SHM is presented showing experimental results considering a reduced number of switching angles applied to a specific three-level converter, but the method can be extrapolated to any other three-level converter topology.…"