-
121
-
122
-
123
-
124
An Auction-Based Scheduling Approach for Minimizing Latency in Fog Computing Using 5G Infrastructure
منشور في 2020احصل على النص الكامل
doctoralThesis -
125
Developing a UAE-Based Disputes Prediction Model using Machine Learning
منشور في 2022احصل على النص الكامل
doctoralThesis -
126
Tensile Test Optimization Using the Design of Experiment and Soft Computing
منشور في 2023"…This study employs a hybrid soft computing approach, integrating an adaptive network-based fuzzy inference system (ANFIS), genetic algorithm (GA) optimization, and design of experiments (DOE). …"
-
127
Parallel Algorithms for Distinguishing Nondeterministic Finite State Machines
منشور في 2015احصل على النص الكامل
doctoralThesis -
128
An improved quorum selection algorithm (IQSA). (c2007)
منشور في 2007احصل على النص الكامل
احصل على النص الكامل
masterThesis -
129
Social spider optimization algorithm: survey and new applications
منشور في 2024"…One of the PSO algorithms or versions is the social spider optimization (SSO) algorithm, a simulation of the interaction between spider groups, males and females. …"
احصل على النص الكامل
-
130
-
131
Data reductions and combinatorial bounds for improved approximation algorithms
منشور في 2016"…Kernelization algorithms in the context of Parameterized Complexity are often based on a combination of data reduction rules and combinatorial insights. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
132
Mining airline data for CRM strategies. (c2006)
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
masterThesis -
133
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
منشور في 2024"…Based on the performance metrics, such as confusion matrix, training time, prediction time, accuracy, and Area Under the Receiver Operating Characteristic curve (AUC-ROC), it was established that SDN-ML-IoT, when applied to RF, outperforms other ML algorithms, as well as similar approaches related to our work. …"
-
134
An Effective Fault Diagnosis Technique for Wind Energy Conversion Systems Based on an Improved Particle Swarm Optimization
منشور في 2022"…First, an efficient feature selection algorithm based on particle swarm optimization (PSO) is proposed. …"
-
135
-
136
Improving the security of SNMP in wireless networks
منشور في 2017"…Simple network management protocol (SNMP) is widely used for monitoring and managing computers and network devices on wired and wireless network. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
137
Parallel physical optimization algorithms for allocating data to multicomputer nodes
منشور في 1994"…They are based on simulated annealing, neural networks and genetic algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
138
Physical optimization algorithms for mapping data to distributed-memory multiprocessors
منشور في 1992"…We also present a technique for efficient mapping of large data sets. The algorithms include a parallel genetic algorithm (PGA), a parallel neural network algorithm (PNN) and a parallel simulated annealing algorithm (PSA). …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
139
Modulation With Metaheuristic Approach for Cascaded-MPUC49 Asymmetrical Inverter With Boosted Output
منشور في 2020"…For the calculation of optimum angles, a meta-heuristic based Genetic Algorithm (GA) technique is employed. …"
-
140
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
منشور في 2010"…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
احصل على النص الكامل