Showing 221 - 240 results of 639 for search '(( element data algorithm ) OR ((( data learning algorithm ) OR ( designed using algorithm ))))', query time: 0.13s Refine Results
  1. 221

    Distributed DRL-Based Downlink Power Allocation for Hybrid RF/VLC Networks by Bekir Sait Ciftler (17541801)

    Published 2021
    “…Our simulation results show that the distributed DDPG-based algorithm learns to adapt against changes in the channel or user requirements, while centralized Genetic Algorithm and Particle Swarm Optimization-based algorithms fail to endure against these changes even with coordination between APs. …”
  2. 222

    Digital twin in energy industry: Proposed robust digital twin for power plant and other complex capital-intensive large engineering systems by Ahmad K. Sleiti (14778229)

    Published 2022
    “…Data-driven algorithms with capabilities to predict the system’s dynamic behavior still need to be developed. …”
  3. 223
  4. 224

    A Genetic Algorithm for Improving Accuracy of Software Quality Predictive Models by Azar, Danielle

    Published 2010
    “…In this paper, we present a genetic algorithm that adapts such models to new data. We give empirical evidence illustrating that our approach out-beats the machine learning algorithm C4.5 and random guess.…”
    Get full text
    Get full text
    Get full text
    article
  5. 225

    A Multiswarm Intelligence Algorithm for Expensive Bound Constrained Optimization Problems by Wali Khan Mashwani (14590504)

    Published 2021
    “…Thirty bound constrained benchmark functions are used to evaluate the performance of the proposed algorithm. …”
  6. 226

    Fuzzified ant colony optimization algorithm for efficient combinational circuits synthesis by Sarif, B.A.B.

    Published 2004
    “…Multiobjective optimization of logic circuits based on a fuzzified ant colony (ACO) algorithm is presented. The results obtained using the proposed algorithm are compared to those obtained using SIS in terms of area, delay and power for some known circuits. …”
    Get full text
    Get full text
    article
  7. 227

    Design of adaptive arrays based on element position perturbations by Dawoud, M.M.

    Published 1993
    “…The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …”
    Get full text
    Get full text
    article
  8. 228
  9. 229

    Efficient heuristic algorithms for influence propagation in social networks. (c2018) by Lamaa, Karine H.

    Published 2018
    “…Then we introduce the notion of an influence propagation function and use it to design an efficient algorithm across all types of networks. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  10. 230

    Multi-Agent Meta Reinforcement Learning for Reliable and Low-Latency Distributed Inference in Resource-Constrained UAV Swarms by Marwan Dhuheir (19170898)

    Published 2025
    “…Given the complexity of the LDTP solution for managing online requests, we propose a real-time, lightweight solution using multi-agent meta-reinforcement learning. Our approach is tested on CNN networks and benchmarked against state-of-the-art conventional reinforcement learning algorithms. …”
  11. 231

    Evolutionary algorithms, simulated annealing and tabu search: a comparative study by Youssef, H.

    Published 2020
    “…The termevolutionary algorithmis used to refer to any probabilistic algorithmwhose design is inspired by evolutionary mechanisms found in biological species. …”
    Get full text
    article
  12. 232

    The buffered work-pool approach for search-tree based optimization algorithms by Abu-Khzam, Faisal N.

    Published 2017
    “…Recent advances in algorithm design have shown a growing interest in seeking exact solutions to many hard problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 233
  14. 234

    A novel design technique for generating building form by KAYED, MAYS N. A.

    Published 2018
    “…The theoretical framework of the technique was successfully tested out and validated by implementing it over serious of examples that are categorized into three groups: examples directed to test out the proposed variables in each process, examples directed to validate the ability of whole technique to generate forms for a hypothetical project requirements and examples of scripting the mechanisms using the algorithmic editor interface and the visual programming language Grasshopper incorporated with Rhinoceros 3D software."…”
    Get full text
  15. 235

    Design and analysis of efficient and secure elliptic curve cryptoprocessors. by Al-Somani, Turki Faisal

    Published 2006
    “…Elliptic Curve Cryptosystems have attracted many researchers and have been included in many standards such as IEEE, ANSI, NIST, SEC and WTLS. The ability to use smaller keys and computationally more efficient algorithms compared with earlier public key cryptosystems such as RSA and ElGamal are two main reasons why elliptic curve cryptosystems are becoming more popular. …”
    Get full text
    masterThesis
  16. 236

    Predicting and Interpreting Student Performance Using Machine Learning in Blended Learning Environments in a Jordanian School Context by SALIM, MAHA JAWDAT

    Published 0024
    “…These platforms enhance academic performance by fostering collaborative learning environments and generating extensive data from every user interaction. …”
    Get full text
  17. 237

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models by Osama Bassam J. Rabie (21323741)

    Published 2024
    “…The novelty of this work is, a recently developed DRF optimization methodology incorporated with the machine learning algorithm is utilized for maximizing the security level of IoT systems. …”
  18. 238

    A new tabu search algorithm for the long-term hydro scheduling problem by Mantawy, A.H.

    Published 2002
    “…The algorithm is based on using the short-term memory of the tabu search (TS) approach to solve the nonlinear optimization problem in continuous variables of the LTHSP. …”
    Get full text
    Get full text
    article
  19. 239

    XBeGene: Scalable XML Documents Generator by Example Based on Real Data by Harazaki, Manami

    Published 2012
    “…Inspired by the query-by-example paradigm in information retrieval, Our generator system i)allows the user to provide her own sample XML documents as input, ii) analyzes the structure, occurrence frequencies, and content distributions for each XML element in the user input documents, and iii) produces synthetic XML documents which closely concur, in both structural and content features, to the user's input data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  20. 240

    NOVEL STACKING CLASSIFICATION AND PREDICTION ALGORITHM BASED AMBIENT ASSISTED LIVING FOR ELDERLY by JINESH, PADIKKAPPARAMBIL

    Published 2022
    “…This study's dataset was sourced from the Kaggle machine learning repository, and it refers to data gathering from wearable IoT devices. …”
    Get full text