-
121
-
122
A data envelopment analysis model for opinion leaders’ identification in social networks
منشور في 2024"…Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. …"
-
123
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
منشور في 2022"…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …"
احصل على النص الكامل
-
124
Implementation and Comparison of Particle Swarm Optimization and Genetic Algorithm Techniques in Combined Economic Emission Dispatch of an Independent Power Plant
منشور في 2019"…Two contemporary metaheuristic techniques, particle swarm optimization (PSO) and genetic algorithm (GA), have were simultaneously implemented for combined economic emission dispatch (CEED) of an independent power plant (IPP) situated in Pakistan for different load demands. …"
-
125
Wearable Real-Time Heart Attack Detection and Warning System to Reduce Road Accidents
منشور في 2019"…It was observed that the linear classification algorithm was not able to detect heart attack in noisy data, whereas the support vector machine (SVM) algorithm with polynomial kernel with extended time–frequency features using extended modified B-distribution (EMBD) showed highest accuracy and was able to detect 97.4% and 96.3% of ST-elevation myocardial infarction (STEMI) and non-ST-elevation MI (NSTEMI), respectively. …"
-
126
Privacy-preserving energy optimization via multi-stage federated learning for micro-moment recommendations
منشور في 2025"…To address this challenge, this study aims to optimize household energy consumption while preserving data privacy by proposing an innovative two-stage Federated Learning (FL) framework that delivers real-time micro-moment-based recommendations. …"
-
127
-
128
-
129
Multi Self-Organizing Map (SOM) Pipeline Architecture for Multi-View Clustering
منشور في 2024"…This raises basic problems like the need for a dimensionality reduction technique for optimal selection of features, fusing the data of different views, and maintaining the inter- and intra-consensus of the multiview dataset. …"
-
130
-
131
Opportunistic Throughput Optimization in Energy Harvesting Dynamic Spectrum Sharing Wireless Networks
منشور في 2024"…Furthermore, we propose two algorithms designed to achieve optimal throughput for each scenario. …"
-
132
-
133
Artificial Intelligence Driven Smart Farming for Accurate Detection of Potato Diseases: A Systematic Review
منشور في 2024"…It has been learned that image-processing techniques overwhelm the existing research and have the potential to integrate meteorological data. The most widely used algorithms incorporate Support Vector Machine (SVM), Random Forest (RF), Convolutional Neural Network (CNN), and MobileNet with accuracy rates between 64.3 and 100%. …"
-
134
Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm
منشور في 2023"…Furthermore, a route management technique is combined with Artificial Intelligence (AI) algorithm to transmit the data to appropriate central servers. …"
-
135
Wind, Solar, and Photovoltaic Renewable Energy Systems with and without Energy Storage Optimization: A Survey of Advanced Machine Learning and Deep Learning Techniques
منشور في 2022"…Computational Intelligence (CI) techniques have been recognized as effective methods in generating and optimizing renewable tools. The complexity of this variety of energy depends on its coverage of large sizes of data and parameters, which have to be investigated thoroughly. …"
احصل على النص الكامل
-
136
Software defect prediction. (c2019)
منشور في 2019احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
137
IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture
منشور في 2025"…The IntruSafe combines FCNN and LSTM to ensure the detection of both malicious text and image data. It detects and simultaneously protects the IoMT network from further intrusion with only a 0.18% service interruption rate. …"
-
138
Topics in graph algorithms
منشور في 2003"…Coping with computational intractability has inspired the development of a variety of algorithmic techniques. The main challenge has usually been the design of polynomial time algorithms for NP-complete problems in a way that guarantees some, often worst-case, satisfactory performance when compared to exact (optimal) solutions. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
139
Deep and transfer learning for building occupancy detection: A review and comparative analysis
منشور في 2022"…Moreover, the paper conducted a comparative study of the readily available algorithms for occupancy detection to determine the optimal method in regards to training time and testing accuracy. …"
-
140