Search alternatives:
method algorithm » mould algorithm (Expand Search)
multi algorithm » mould algorithm (Expand Search), auction algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
method algorithm » mould algorithm (Expand Search)
multi algorithm » mould algorithm (Expand Search), auction algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
-
341
Joint computing, communication and cost-aware task offloading in D2D-enabled Het-MEC
Published 2022“…Furthermore, we propose a low-complexity algorithm that generates high performance results and can be applied for large-scale networks. …”
Get full text
Get full text
Get full text
Get full text
article -
342
A Navigation and Control System for a Robot in Indoor/Outdoor Environments
Published 2016Get full text
doctoralThesis -
343
-
344
The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions
Published 2022“…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
-
345
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…In this paper, we describe a new approach for XML keyword search aiming to solve the limitations mentioned above. Our solution first transforms the XML document collection (offline) and the keyword query (on-the-fly) into meaningful semantic representations using context-based and global disambiguation methods, specially designed to allow almost linear computation efficiency. …”
Get full text
Get full text
Get full text
Get full text
article -
346
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
Published 2021“…Its security has been verified formally using Random Oracle Model (ROM), ProVerif2.02 and informally using assumptions and pragmatic illustration. …”
-
347
Dynamic single node failure recovery in distributed storage systems
Published 2017“…To minimize the system repair cost, we formulate our problem using incidence matrices and solve it heuristically using genetic algorithms for all possible cases of single node failures. …”
Get full text
Get full text
Get full text
Get full text
article -
348
Modelling of pollutant transport in compound open channels
Published 1998“…Longitudinal and transverse mixing coefficients were calculated using the method of moments and by estimation using empirical relationships. …”
Get full text
Get full text
masterThesis -
349
Reliability and fault tolerance based topological optimization of computer networks - part II: iterative techniques
Published 2003“…We consider fault-tolerance to be an important network design aspect. We consider the use of three iterative techniques, namely tabu search, simulated annealing, and genetic algorithms, in solving the multiobjective topological optimization network design problem. …”
Get full text
Get full text
article -
350
Optimal Trajectory and Positioning of UAVs for Small Cell HetNets: Geometrical Analysis and Reinforcement Learning Approach
Published 2023“…We then formulate the problem for UAV trajectory to minimize the maximum outage probability (OP) of directional THz links. Then, using geometrical analysis and deep reinforcement learning (RL) method, we propose several algorithms to find the optimal trajectory and select an optimal pattern during the trajectory. …”
-
351
ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks
Published 2022“…Recently, cognitive network architectures using sophisticated learning techniques are increasingly being applied to such problems. …”
-
352
DASSI: differential architecture search for splice identification from DNA sequences
Published 2022“…<h2>Background</h2> <p>The data explosion caused by unprecedented advancements in the field of genomics is constantly challenging the conventional methods used in the interpretation of the human genome. The demand for robust algorithms over the recent years has brought huge success in the field of Deep Learning (DL) in solving many difficult tasks in image, speech and natural language processing by automating the manual process of architecture design. …”
-
353
-
354
On the complexity of various parameterizations of common induced subgraph isomorphism
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
355
Industrial Internet of Things enabled technologies, challenges, and future directions
Published 2023“…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …”
Get full text
Get full text
Get full text
article -
356
The multi-parameterized cluster editing problem
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
357
Scatter search technique for exam timetabling
Published 2011“…These constraints are conflicting, which makes exam timetabling intractable. Hence, solving this problem in realistic time requires the use of heuristic approaches. …”
Get full text
Get full text
Get full text
article -
358
Industrial Internet of Things enabled technologies, challenges, and future directions
Published 2023“…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …”
-
359
Iterative Methods for the Solution of a Steady State Biofilter Model
Published 2017Get full text
doctoralThesis