Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
system » systems (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
system » systems (Expand Search)
-
841
A Comprehensive Review of Digital Twin Technology in Building Energy Consumption Forecasting
Published 2024“…<p dir="ltr">With the global rise in urban populations, energy consumption in buildings has become a critical issue, now accounting for about 30% of total global energy use. Developing powerful energy forecasting systems is challenging due to frequent fluctuations in energy demand. …”
-
842
Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort
Published 2023“…However, these BEMSs often suffer from a critical limitation—they are primarily trained on building energy data alone, disregarding crucial elements such as occupant comfort and preferences. …”
-
843
-
844
An intelligent approach to predicting the effect of nanoparticle mixture ratio, concentration and temperature on thermal conductivity of hybrid nanofluids
Published 2020“…A polynomial correlation model, the adaptive neuro-fuzzy inference system model and an artificial neural network model optimised with three different learning algorithms. …”
-
845
Sentiment visualization of correlation of loneliness mapped through social intelligence analysis
Published 2024“…<h3>Background</h3><p dir="ltr">Loneliness is a global public health issue affecting a considerable number of people as well as burdening the public health system and increasing the risk of other life-threatening and life-damaging conditions. …”
-
846
Growing hierarchical self-organizing map for filtering intrusion detection alarms
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
847
-
848
Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review
Published 2024“…Furthermore, this study also focuses on different Machine learning algorithms that are used to secure wireless sensor networks. …”
-
849
An XML Document Comparison Framework
Published 2001“…Most of them make use of techniques for finding the edit distance between tree structures, XML documents being modeled as Ordered Labeled Trees. …”
Get full text
Get full text
Get full text
article -
850
A novel XML document structure comparison framework based-on sub-tree commonalities and label semantics
Published 2011“…Most of them make use of techniques for finding the edit distance between tree structures, XML documents being commonly modeled as Ordered Labeled Trees. …”
Get full text
Get full text
Get full text
Get full text
article -
851
-
852
-
853
FoGMatch
Published 2019“…To address this problem, we propose in this paper a multi-criteria intelligent IoT scheduling approach in fog computing environments using matching game theory. Our solution consists of (1) two optimization problems, one for the IoT devices and one for the fog nodes, (2) preference functions for both the IoT and fog layers to help them rank each other on the basis of several criteria such latency and resource utilization, and (3) centralized and distributed intelligent scheduling algorithms that consider the preferences of both the fog and IoT layers to improve the performance of the overall IoT ecosystem. …”
Get full text
Get full text
Get full text
masterThesis -
854
Full-fledged semantic indexing and querying model designed for seamless integration in legacy RDBMS
Published 2018“…In the past decade, there has been an increasing need for semantic-aware data search and indexing in textual (structured and NoSQL) databases, as full-text search systems became available to non-experts where users have no knowledge about the data being searched and often formulate query keywords which are different from those used by the authors in indexing relevant documents, thus producing noisy and sometimes irrelevant results. …”
Get full text
Get full text
Get full text
Get full text
article -
855
-
856
-
857
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
Published 2021“…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …”
Get full text
-
858
Data mining approach to predict student's selection of program majors
Published 2019“…This study presents an approach to design and deploy a data mining project that can be used as a basis for developing systems to enable the selection of student majors.…”
Get full text
-
859
Modélisation et validation des modèles de véhicules hybrides
Published 2009Get full text
Get full text
Get full text
masterThesis -
860
Developing an online hate classifier for multiple social media platforms
Published 2020“…We make our code publicly available for application in real software systems as well as for further development by online hate researchers.…”