Search alternatives:
present selection » greedy selection (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
present selection » greedy selection (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
-
121
-
122
Reliability and fault tolerance based topological optimization of computer networks - part II: iterative techniques
Published 2003“…Topological optimization of computer networks is concerned with the selection of a subset of the available links such that the reliability and fault-tolerance aspects are maximized while meeting a cost constraint. …”
Get full text
Get full text
article -
123
An Alternating Projection Framework for Elementwise Masked Nonlinear Matrix Decomposition
Published 2025Get full text
doctoralThesis -
124
Design and simulation of superdirective adaptive antenna arrays
Published 1990“…The commonly used adaptive algorithms were compared and the LMS (least mean square) algorithm was selected for the simulation of the adaptive array system. …”
Get full text
Get full text
article -
125
Fragment based protein structure prediction. (c2013)
Published 2016“…Backbone fragments selections extracted from the Robetta server are followed by side chain selections, extracted from the Dunbrack Library. …”
Get full text
Get full text
masterThesis -
126
Local convexity preserving rational cubic spline curves
Published 1997“…An algorithm is presented which constructs a curve by interpolating the given data points. …”
Get full text
Get full text
article -
127
Developing an online hate classifier for multiple social media platforms
Published 2020“…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …”
-
128
A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques
Published 2022“…Amongst the range of classification algorithms, support vector machines (SVMs) are heavily utilised for detecting phishing emails. …”
Get full text
Get full text
-
129
The Use of Enumerative Techniques in Topological Optimization of Computer Networks Subject to Fault Tolerance and Reliability
Published 2003“…Experimental results obtained from a set of randomly generated networks using the proposed algorithms are presented and compared to those obtained using the existing techniques [1], [2]. …”
Get full text
article -
130
Reliability and fault tolerance based topological optimization of computer networks - part I: enumerative techniques
Published 2003“…Experimental results obtained from a set of randomly generated networks using the proposed algorithms are presented and compared to those obtained using existing techniques. …”
Get full text
Get full text
article -
131
Dynamic Layout Planning Using a Hybrid Incremental Solution Method
Published 1999“…A dynamic layout construction procedure is presented here. Construction resources, represented as rectangles, are subjected to two-dimensional geometric constraints on relative locations. …”
Get full text
Get full text
Get full text
article -
132
-
133
-
134
User-centric strategies for resource management in heterogeneous wireless networks with QoS considerations
Published 2017“…We demonstrate their e↵ectiveness by presenting performance results and analysis for a wide range of network scenarios.…”
Get full text
Get full text
Get full text
masterThesis -
135
Dynamic single node failure recovery in distributed storage systems
Published 2017“…The contributions of the paper are four fold: (i) generating an optimized block distribution scheme among the nodes of a given data center for fixed and variable size blocks; (ii) optimization of storage allocation under dynamic environments with data block arrivals; (iii) optimization of storage allocation with newly added storage nodes; and (iv) generating an effective block distribution scheme among the nodes by accounting for varying priorities among data blocks. We present a wide range of results for the various proposed algorithms and considered scenarios to quantify the achievable performance gains.…”
Get full text
Get full text
Get full text
Get full text
article -
136
Precision nutrition: A systematic literature review
Published 2021“…In total, 30 algorithms were used, with 19 appearing more than once. …”
-
137
Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort
Published 2023“…However, these BEMSs often suffer from a critical limitation—they are primarily trained on building energy data alone, disregarding crucial elements such as occupant comfort and preferences. …”
-
138
An Enhanced Approach for Solar PV Hosting Capacity Analysis in Distribution Networks
Published 2022“…Therefore, it is imperative to account for these adverse effects of the integration of DERs on the distribution network and minimize their impact when calculating the Hosting Capacity (HC). Two algorithms are presented in this study derived from a novel modified iterative method and a novel Repeated Particle Swarm Optimization (RPSO) method for determining the HC for multiple DER units simultaneously or a single DER unit integrating into radial or mesh networks. …”
-
139
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
Published 2023“…Therefore, a systematic approach is presented to unfold the efforts and approaches of ANNs towards the security challenges of IoT. …”
-
140
On the Provisioning of Ultra-Reliable Low-Latency Services in IoT Networks with Multipath Diversity
Published 2020“…Simulation results are presented for both parts of the thesis to illustrate the effectiveness of the proposed solutions and algorithms in comparison with optimal solutions and baseline algorithms.…”
Get full text
Get full text
Get full text
masterThesis