Search alternatives:
groups algorithm » mould algorithm (Expand Search)
element » elements (Expand Search)
groups algorithm » mould algorithm (Expand Search)
element » elements (Expand Search)
-
201
-
202
Portfolio Selection Problem Using CVaR Risk Measures Equipped with DEA, PSO, and ICA Algorithms
Published 2022“…It was found that when solving the Mean-CVaR model with evolutionary algorithms, the risk decreased. The efficient boundary of the PSO algorithm was higher than that of the ICA algorithm, and it displayed more efficient portfolios.Therefore, this algorithm was more successful in optimizing the portfolio.…”
-
203
-
204
Enhanced DC Microgrid Protection: a Neural Network and Wavelet Transform Approach
Published 2024Get full text
doctoralThesis -
205
LaScaDa: A Novel Scalable Topology for Data Center Network
Published 2020“…LaScaDa forwards packets between nodes using a new hierarchical row-based routing algorithm. The algorithm constructs the route to the source based on the modular difference between the source and destination coordinates. …”
-
206
Random vector functional link network: Recent developments, applications, and future directions
Published 2023“…To overcome these issues, randomization based neural networks such as random vector functional link (RVFL) network have been proposed. …”
-
207
An Incentivized and Optimized Dynamic Mechanism for Demand Response for Managing Voltage in Distribution Networks
Published 2022“…This study proposes a dynamic fair incentive mechanism using a multi-scheme load control algorithm for a large number of DR participants coordinating with the existing network equipment for managing voltage at medium voltage (MV) networks. …”
-
208
-
209
A data envelopment analysis model for opinion leaders’ identification in social networks
Published 2024“…Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. …”
-
210
On the Provisioning of Ultra-Reliable Low-Latency Services in IoT Networks with Multipath Diversity
Published 2020“…We de ne the constraints of the problem, model it as a Markov Decision Process, and propose a reinforcement learning-based solution to optimize the UAV trajectory. Simulation results are presented for both parts of the thesis to illustrate the effectiveness of the proposed solutions and algorithms in comparison with optimal solutions and baseline algorithms.…”
Get full text
Get full text
Get full text
masterThesis -
211
User-centric strategies for resource management in heterogeneous wireless networks with QoS considerations
Published 2017“…We first design a learning-based approach for network selection where a user utilizes one wireless interface at a time to achieve either minimum energy consumption, maximum throughput or energy eciency based on user preferences. …”
Get full text
Get full text
Get full text
masterThesis -
212
Traffic Offloading with Channel Allocation in Cache-Enabled Ultra-Dense Wireless Networks
Published 2018“…We also propose efficient sub-optimal hierarchical tree-based algorithms that operate in real time with dynamic and fast solutions for ultra dense networks. …”
Get full text
Get full text
Get full text
Get full text
article -
213
Opportunistic Throughput Optimization in Energy Harvesting Dynamic Spectrum Sharing Wireless Networks
Published 2024“…<p dir="ltr">We investigate opportunistic transmissions in a time-slotted wireless network, emphasizing constraints arising from finite durations allocated to various network operations and the availability of energy for these operations. …”
-
214
A localized navigation algorithm for radiation evasion for nuclear facilities: Optimizing the "Radiation Evasion" criterion: Part I
Published 2013“…This will automatically benefit from the most recent trends in technology developments in both sensor networks and wireless communication. When used to navigate based on local radiation information, the algorithm will behave more reliably when accidents happen, since no long-haul communication links are required for information exchange. …”
Get full text
article -
215
Arabic Text Classification Using Modified Artificial Bee Colony Algorithm for Sentiment Analysis: The Case of Jordanian Dialect
Published 2022“…The second phase, modified the Artificial Bee Colony (ABC) Algorithm, with Upper Confidence Bound (UCB) Algorithm, to promote the exploitation ability for the minimum dimension, to get the minimum number of the optimal feature, then using forward feature selection strategy by four classifiers of machine learning algorithms: (K-Nearest Neighbors (KNN), Support vector machines (SVM), Naïve-Bayes (NB), and Polynomial Neural Networks (PNN). …”
Get full text
-
216
Stochastic Programming for Hub Energy Management Considering Uncertainty Using Two-Point Estimate Method and Optimization Algorithm
Published 2023“…The proposed IARO-based scheduling framework’s performance is evaluated against that of traditional ARO, particle swarm optimization (PSO), and salp swarm algorithm (SSA). …”
-
217
-
218
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
Published 2022“…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
-
219
MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks
Published 2009“…This paper introduces a message forwarding algorithm for search applications within mobile ad hoc networks that is based on the concept of selecting the nearest node from a set of designated nodes. …”
Get full text
Get full text
Get full text
Get full text
article -
220
A Micro-Economics Approach for Scheduling in CDMA Networks with End-to-End QoS Guarantees
Published 2007“…To efficiently utilize the available radio resources, we propose a new scheduling algorithm based on techniques from micro-economics. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject