Search alternatives:
making algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
data making » data mining (Expand Search)
element » elements (Expand Search)
making algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
data making » data mining (Expand Search)
element » elements (Expand Search)
-
41
UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks
Published 2018“…Among the emerging markets, Internet of Things (IoT) use cases are standing out with the proliferation of a wide range of sensors that can be configured to continuously monitor and transmit data for intelligent processing and decision making. …”
Get full text
Get full text
Get full text
Get full text
article -
42
Automatic keyword extraction from a real estate classifieds data set
Published 2011“…We begin with designing data cleansing algorithms to verify different attributes of the real estate classified. …”
Get full text
-
43
A data envelopment analysis model for opinion leaders’ identification in social networks
Published 2024“…Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. …”
-
44
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
45
Practical single node failure recovery using fractional repetition codes in data centers
Published 2016“…In addition, we account for new-comer blocks and allocate them to nodes with minimal computations and without changing the original optimal schema. This makes our work practical to apply. Hence, a practical solution for node failures is presented by using a self-designed genetic algorithm that searches within the feasible solution space. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
46
-
47
Stochastic management of hybrid AC/DC microgrids considering electric vehicles charging demands
Published 2020“…A novel evolving solution based on flower pollination algorithm is also proposed to solve the problem optimally. …”
Get full text
Get full text
Get full text
article -
48
-
49
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
Published 2007“…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …”
Get full text
Get full text
Get full text
article -
50
Evaluation of C-arm CT metal artifact reduction algorithm during intra-aneurysmal coil embolization
Published 2016“…This analysis was carried out to assess the improvements in both brain parenchyma and device visibility with MAR algorithm. Further, ground truth reference images from phantom experiments and clinical data were used for accurate assessment. …”
Get full text
Get full text
Get full text
Get full text
article -
51
Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights
Published 2021“…In the age of the smart city, Internet of Things (IoT), and big data analytics, the complex nature of data-driven civil infrastructures monitoring frameworks has not been fully matured. …”
Get full text
article -
52
-
53
Data of simulation model for photovoltaic system's maximum power point tracking using sequential Monte Carlo algorithm
Published 2024“…The model aims to compare the performance of classical perturb and observe (P&O) algorithm, particle swarm optimization (PSO) algorithm, flower pollination algorithm (FPA), and SMC-based tracking techniques. …”
Get full text
Get full text
Get full text
article -
54
Stochastic Programming for Hub Energy Management Considering Uncertainty Using Two-Point Estimate Method and Optimization Algorithm
Published 2023“…The standard ARO algorithm is developed to mimic the foraging behavior of rabbits, and in this work, the algorithm’s effectiveness in avoiding premature convergence is improved by using the dystudynamic inertia weight technique. …”
-
55
FarmTech: Regulating the use of digital technologies in the agricultural sector
Published 2023“…<p dir="ltr">Farming relies on the accurate collection and processing of data. Algorithms utilizing artificial intelligence can predict patterns and spot problems, helping farmers make more informed decisions. …”
-
56
An Enhanced Approach for Solar PV Hosting Capacity Analysis in Distribution Networks
Published 2022“…The developed algorithms were tested on the IEEE 123 bus network, and their results were compared. …”
-
57
Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT
Published 2021“…There have been notable challenges regarding the security of data and challenges related to privacy when collecting real-time and automatic data while observing applications in the industry. …”
-
58
Nonlinear analysis of shell structures using image processing and machine learning
Published 2023“…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …”
-
59
-
60
Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform
Published 2022“…The proposed framework meets these privacy requirements by (i) anonymizing both the unique account identifier (NIN) and balance information through customized data generalization and distortion techniques and (ii) making trading transactions unlinkable to their original investors by ensuring that both the NIN and balance are <i>k</i> -anonymous; i.e., <i>k</i> accounts belonging to different investors have the same balance. …”