Search alternatives:
groups algorithm » mould algorithm (Expand Search)
element » elements (Expand Search)
Showing 201 - 220 results of 438 for search '(( element network algorithm ) OR ((( data groups algorithm ) OR ( based network algorithm ))))', query time: 0.14s Refine Results
  1. 201
  2. 202

    Portfolio Selection Problem Using CVaR Risk Measures Equipped with DEA, PSO, and ICA Algorithms by Abdelouahed Hamdi (14158899)

    Published 2022
    “…It was found that when solving the Mean-CVaR model with evolutionary algorithms, the risk decreased. The efficient boundary of the PSO algorithm was higher than that of the ICA algorithm, and it displayed more efficient portfolios.Therefore, this algorithm was more successful in optimizing the portfolio.…”
  3. 203
  4. 204
  5. 205

    LaScaDa: A Novel Scalable Topology for Data Center Network by Zina Chkirbene (16869987)

    Published 2020
    “…LaScaDa forwards packets between nodes using a new hierarchical row-based routing algorithm. The algorithm constructs the route to the source based on the modular difference between the source and destination coordinates. …”
  6. 206

    Random vector functional link network: Recent developments, applications, and future directions by A.K. Malik (16003193)

    Published 2023
    “…To overcome these issues, randomization based neural networks such as random vector functional link (RVFL) network have been proposed. …”
  7. 207

    An Incentivized and Optimized Dynamic Mechanism for Demand Response for Managing Voltage in Distribution Networks by Md Moktadir Rahman (16904751)

    Published 2022
    “…This study proposes a dynamic fair incentive mechanism using a multi-scheme load control algorithm for a large number of DR participants coordinating with the existing network equipment for managing voltage at medium voltage (MV) networks. …”
  8. 208
  9. 209

    A data envelopment analysis model for opinion leaders’ identification in social networks by Hamed Baziyad (19273738)

    Published 2024
    “…Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. …”
  10. 210

    On the Provisioning of Ultra-Reliable Low-Latency Services in IoT Networks with Multipath Diversity by Sweidan, Zahraa

    Published 2020
    “…We de ne the constraints of the problem, model it as a Markov Decision Process, and propose a reinforcement learning-based solution to optimize the UAV trajectory. Simulation results are presented for both parts of the thesis to illustrate the effectiveness of the proposed solutions and algorithms in comparison with optimal solutions and baseline algorithms.…”
    Get full text
    Get full text
    Get full text
    masterThesis
  11. 211

    User-centric strategies for resource management in heterogeneous wireless networks with QoS considerations by Abbas, Nadine Fawaz

    Published 2017
    “…We first design a learning-based approach for network selection where a user utilizes one wireless interface at a time to achieve either minimum energy consumption, maximum throughput or energy eciency based on user preferences. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  12. 212

    Traffic Offloading with Channel Allocation in Cache-Enabled Ultra-Dense Wireless Networks by Abbas, Nadine

    Published 2018
    “…We also propose efficient sub-optimal hierarchical tree-based algorithms that operate in real time with dynamic and fast solutions for ultra dense networks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  13. 213

    Opportunistic Throughput Optimization in Energy Harvesting Dynamic Spectrum Sharing Wireless Networks by Amirhossein Taherpour (19273879)

    Published 2024
    “…<p dir="ltr">We investigate opportunistic transmissions in a time-slotted wireless network, emphasizing constraints arising from finite durations allocated to various network operations and the availability of energy for these operations. …”
  14. 214

    A localized navigation algorithm for radiation evasion for nuclear facilities: Optimizing the "Radiation Evasion" criterion: Part I by Khasawneh, Mohammad

    Published 2013
    “…This will automatically benefit from the most recent trends in technology developments in both sensor networks and wireless communication. When used to navigate based on local radiation information, the algorithm will behave more reliably when accidents happen, since no long-haul communication links are required for information exchange. …”
    Get full text
    article
  15. 215

    Arabic Text Classification Using Modified Artificial Bee Colony Algorithm for Sentiment Analysis: The Case of Jordanian Dialect by Habeeb, Abdallah

    Published 2022
    “…The second phase, modified the Artificial Bee Colony (ABC) Algorithm, with Upper Confidence Bound (UCB) Algorithm, to promote the exploitation ability for the minimum dimension, to get the minimum number of the optimal feature, then using forward feature selection strategy by four classifiers of machine learning algorithms: (K-Nearest Neighbors (KNN), Support vector machines (SVM), Naïve-Bayes (NB), and Polynomial Neural Networks (PNN). …”
    Get full text
  16. 216

    Stochastic Programming for Hub Energy Management Considering Uncertainty Using Two-Point Estimate Method and Optimization Algorithm by Ali S. Alghamdi (17541711)

    Published 2023
    “…The proposed IARO-based scheduling framework’s performance is evaluated against that of traditional ARO, particle swarm optimization (PSO), and salp swarm algorithm (SSA). …”
  17. 217
  18. 218

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment by Zakaria Tolba (16904718)

    Published 2022
    “…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
  19. 219

    MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks by Artail, Hassan

    Published 2009
    “…This paper introduces a message forwarding algorithm for search applications within mobile ad hoc networks that is based on the concept of selecting the nearest node from a set of designated nodes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  20. 220

    A Micro-Economics Approach for Scheduling in CDMA Networks with End-to-End QoS Guarantees by Saad, Walid

    Published 2007
    “…To efficiently utilize the available radio resources, we propose a new scheduling algorithm based on techniques from micro-economics. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject