Search alternatives:
modelling algorithm » scheduling algorithm (Expand Search)
masld algorithm » mould algorithm (Expand Search), carlo algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
modelling algorithm » scheduling algorithm (Expand Search)
masld algorithm » mould algorithm (Expand Search), carlo algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
-
141
-
142
Sentiment visualization of correlation of loneliness mapped through social intelligence analysis
Published 2024“…Social media platforms have become a valuable source of data to study this phenomenon.</p><h3>Objectives</h3><p dir="ltr">This paper aims to visualize the frequency of loneliness-related themes and topics in Twitter data. …”
-
143
Energy-Efficient VoI-Aware UAV-Assisted Data Collection in Wireless Sensor Networks
Published 2025“…To address these objectives, our proposed approach incorporates deep reinforcement learning (RL-DQN) techniques to optimize UAV deployment, minimizing the number of UAVs while maximizing the number of successfully collected SNs with non-redundant data. The model considers VoI and energy constraints of the SNs, enhancing both efficiency and sustainability. …”
Get full text
Get full text
Get full text
masterThesis -
144
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
Published 2024“…Exploratory Data Analysis (EDA) highlights the class imbalance problem in detecting fake jobs, which tends the model to act aggressively toward the minority class. …”
-
145
-
146
Prediction of pressure gradient for oil-water flow: A comprehensive analysis on the performance of machine learning algorithms
Published 2022“…While the previous studies mostly used ANN to demonstrate the capability of MLs to predict PG over the mechanistic or correlation-based models, the present research has shown that GP is even better than ANN using a wide range of FPs and a large data set.…”
-
147
Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem
Published 2016“…This research note describes Response-Based Unit Segmentation (REBUS), a “latent class detection” technique used in partial least squares–structural equation modeling (PLS-SEM) to examine data heterogeneity. The research note is presented in two parts: Part A presents an overview of REBUS, including its development, algorithm, and its primary functions. …”
Get full text
Get full text
Get full text
Get full text
article -
148
Portfolio Selection Problem Using CVaR Risk Measures Equipped with DEA, PSO, and ICA Algorithms
Published 2022“…It was found that when solving the Mean-CVaR model with evolutionary algorithms, the risk decreased. …”
-
149
A Comprehensive Review of Digital Twin Technology in Building Energy Consumption Forecasting
Published 2024“…The digitalization of building energy forecasting systems, enhanced by Energy Digital Twin technology alongside IoT devices and advanced data-driven algorithms, offers substantial improvements in energy management and optimization, servicing, maintenance, and energy-efficient design. …”
-
150
Digital twin in energy industry: Proposed robust digital twin for power plant and other complex capital-intensive large engineering systems
Published 2022“…Furthermore, this paper demonstrates the advantages of the developed ADL algorithm approach and DSM prediction of the DT using vector autoregressive model for anomaly detection in utility gas turbines with data from an operational power plant.…”
-
151
-
152
Hardware Model of an Expandable RSA Cryptographic System
Published 1998“…Data security is an important aspect of information transmission and storage in an electronic form. …”
Get full text
Get full text
Get full text
masterThesis -
153
A Framework for Predictive Modeling in Sustainable Projects
Published 2012Get full text
doctoralThesis -
154
-
155
Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques
Published 2020“…The obtained results illustrate the efficacy of the proposed algorithm to analyze the time series data from the IoT devices for spam detection.…”
-
156
-
157
-
158
A Blockchain Model for Secure Communications in Internet of Vehicles
Published 2021“…In this paper, we present a framework for secure IoV communications by utilizing the High Performance Blockchain Consensus (HPBC) algorithm. Based on a previously published communication model for VANETs that uses an efficient routing protocol for transmitting packets between vehicles, we describe in this paper how to integrate a blockchain model on top of the IoV communications system. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
159
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
160
A Hardware Model of an Expandable RSA Cryptogrsphic System
Published 1998“…Data security is an important aspect of information transmission and storage in an electronic form. …”
Get full text
masterThesis