Search alternatives:
generation algorithm » genetic algorithm (Expand Search), detection algorithm (Expand Search)
select generation » next generation (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
generation algorithm » genetic algorithm (Expand Search), detection algorithm (Expand Search)
select generation » next generation (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
-
81
Oversampling techniques for imbalanced data in regression
Published 2024“…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …”
-
82
Blockchain-Based Decentralized Architecture for Software Version Control
Published 2023“…The proof of authority (PoA) consensus algorithm will be used to approve the developer communicating modifications to the private blockchain network; the authority will only provide permission and will not be able to add, edit, or delete code files. …”
-
83
Modeling and Control of a Thermally Driven MEMS Actuator for RF Applications
Published 2017Get full text
doctoralThesis -
84
-
85
Structural similarity evaluation between XML documents and DTDs
Published 2007“…The automatic processing and management of XML-based data are ever more popular research issues due to the increasing abundant use of XML, especially on the Web. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
86
A survey and comparison of wormhole routing techniques in a meshnetworks
Published 1997“…These multiprocessing systems consist of processing elements or nodes which are connected together by interconnection networks in various topologies. …”
Get full text
Get full text
article -
87
A Machine Learning Approach to Predicting Diabetes Complications
Published 2021Get full text
doctoralThesis -
88
-
89
Autonomous Robot Navigation Based On Recurrent Neural Networks
Published 2012Get full text
doctoralThesis -
90
-
91
Local convexity preserving rational cubic spline curves
Published 1997“…A particular scheme is suggested which selects the tangent vectors required at each interpolation point for generating a curve. …”
Get full text
Get full text
article -
92
Investigating the Impact of Skylights and Atrium Configurations on Visual Comfort and Daylight Performance in Dubai Shopping Malls
Published 2025“…Annual simulations are used to assess seasonal variations, while sensitivity analysis identifies key parameters. A genetic algorithm and multi-objective optimisation (MOO) simulations are used to generate optimal configurations, summarised in the form of a Pareto front selection criteria guide the choice of the optimum solution, which is then applied and analysed in a case study. …”
Get full text
-
93
Resources Allocation for Drones Tracking Utilizing Agent-Based Proximity Policy Optimization
Published 2023“…In particular, the Proximity Policy Optimization (PPO) reinforcement algorithm is used to discover a policy for sensor selection that results in optimum sensor resource allocation. …”
Get full text
-
94
UML-based regression testing for OO software
Published 2010“…For the second phase, we present algorithms for detecting system level changes in the interaction overview diagram. …”
Get full text
Get full text
Get full text
article -
95
Advancing Coherent Power Grid Partitioning: A Review Embracing Machine and Deep Learning
Published 2025“…Additionally, it assists stakeholders in selecting the most appropriate clustering algorithms for PGP applications.…”
-
96
The Use of Enumerative Techniques in Topological Optimization of Computer Networks Subject to Fault Tolerance and Reliability
Published 2003“…Experimental results obtained from a set of randomly generated networks using the proposed algorithms are presented and compared to those obtained using the existing techniques [1], [2]. …”
Get full text
article -
97
Reliability and fault tolerance based topological optimization of computer networks - part I: enumerative techniques
Published 2003“…Experimental results obtained from a set of randomly generated networks using the proposed algorithms are presented and compared to those obtained using existing techniques. …”
Get full text
Get full text
article -
98
UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks
Published 2018“…Moreover, we propose a set of effective algorithms to generate solutions for relatively large-scale network scenarios. …”
Get full text
Get full text
Get full text
Get full text
article -
99
Adaptive Fault-Tolerant Communication Based-Control for Parallel Connected Rectifiers
Published 2023“…The master can be selected and changed automatically based on a negotiation algorithm among the connected rectifiers. …”
-
100