Search alternatives:
mining algorithm » cosine algorithm (Expand Search)
developing based » developing a (Expand Search), developing 21st (Expand Search)
data algorithms » jaya algorithm (Expand Search)
element » elements (Expand Search)
mining algorithm » cosine algorithm (Expand Search)
developing based » developing a (Expand Search), developing 21st (Expand Search)
data algorithms » jaya algorithm (Expand Search)
element » elements (Expand Search)
-
181
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
Published 2015“…All the approach components and algorithms realizing the proposed analysis semantics have been implemented in one development framework. …”
Get full text
Get full text
Get full text
article -
182
-
183
A combinatorial auction‐based approach for ridesharing in a student transportation system
Published 2023“…A hybrid heuristic-based optimization framework, that takes advantage of meta-heuristic algorithms to improve an initial solution, is also developed to solve large-sized instances of the problem. …”
-
184
Analysis of power system stability enhancement via excitation and FACTS-based stabilizers
Published 2004“…An eigenvalue-based objective function to increase the system damping and improve the system response is developed. …”
Get full text
article -
185
Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers
Published 2023“…The OSF detection and localization algorithm is implemented based on the dynamic response difference between the physical system and its DT. …”
-
186
AI-based remaining useful life prediction and modelling of seawater desalination membranes
Published 2024Get full text
doctoralThesis -
187
A heuristics for HTTP traffic identification in measuring user dissimilarity
Published 2020“…The study utilizes HTTP request method of GET filtering, to develop a heuristic algorithm to identify user-initiated requests. …”
-
188
-
189
Behavior-Based Machine Learning Approaches to Identify State-Sponsored Trolls on Twitter
Published 2020“…We have proposed a set of behavioral features of users' activities on Twitter. Based on these features, we developed four classification models to identify political troll accounts, these models are based on decision tree, random forest, Adaboost, and gradient boost algorithms. …”
-
190
-
191
Secrecy Performance of Decode-and-Forward Based Hybrid RF/VLC Relaying Systems
Published 2019“…<p dir="ltr">In this paper, we consider the secrecy of a hybrid radio frequency (RF)/visible light communication (VLC) system equipped with decode-and-forward relaying. We develop physical layer security algorithms that mitigate eavesdropping on both RF and VLC networks based on zero-forcing beamforming techniques. …”
-
192
Utilization of AI to Predict Shear Strength Parameters of Soil Based on Their Physical Properties
Published 2025Get full text
doctoralThesis -
193
DRL-Based IRS-Assisted Secure Hybrid Visible Light and mmWave Communications
Published 2024“…The DDPG algorithm can adapt to channel variations due to user movement and high-dimensional factors. …”
-
194
A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis
Published 2021“…Specifically, we used a clustering algorithm to group published articles based on the similarity of their abstracts to identify research hotspots and current research directions. …”
-
195
Nonlinear Control of Brushless Dual-Fed Induction Generator With a Flywheel Energy Storage System for Improved System Performance
Published 2025“…In the first stage, a robust Sliding Mode Control (SMC)-based nonlinear decoupled control algorithm is designed to efficiently regulate BDFIG operation. …”
-
196
Identification of physically based models of residential air-conditioners for direct load control management
Published 2004“…An online maximum-likelihood based identification algorithm is developed for A/C, the required hardware and system instrumentation is detailed. …”
Get full text
Get full text
article -
197
Neural network-based failure rate prediction for De Havilland Dash-8 tires
Published 2006Get full text
article -
198
Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las...
Published 2020“…In view of this, an innovative signal processing technique called a self-adaptive-smart algorithm (SASA) was designed and developed. In SASA, the incident wave that is the first coming wave-packet is taken as a mother wavelet. …”
Get full text
-
199
Minimizing using BBO and DFO methods
Published 2022“…The goal of this thesis is to develop two MATLAB codes for the numerical algorithm of [1]. …”
Get full text
Get full text
Get full text
masterThesis -
200
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
Published 2021“…This issue of security risk can be minimized conspicuously by developing a robust authentication scheme for IoD deployment military drones. …”