Search alternatives:
custom algorithm » control algorithm (Expand Search), auction algorithm (Expand Search), cosine algorithm (Expand Search)
making algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data making » data mining (Expand Search)
custom algorithm » control algorithm (Expand Search), auction algorithm (Expand Search), cosine algorithm (Expand Search)
making algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data making » data mining (Expand Search)
-
321
Deep Learning in Smart Grid Technology: A Review of Recent Advancements and Future Prospects
Published 2021“…This ongoing transition undergoes rapid changes, requiring a plethora of advanced methodologies to process the big data generated by various units. In this context, SG stands tied very closely to Deep Learning (DL) as an emerging technology for creating a more decentralized and intelligent energy paradigm while integrating high intelligence in supervisory and operational decision-making. …”
-
322
Developing an online hate classifier for multiple social media platforms
Published 2020“…However, at the same time, this has resulted in the emergence of conflict and hate, making online environments uninviting for users. Although researchers have found that hate is a problem across multiple platforms, there is a lack of models for online hate detection using multi-platform data. …”
-
323
A hybrid Harris Hawks optimizer for economic load dispatch problems
Published 2022“…Furthermore, the proposed algorithm is evaluated on two ELD real-world cases which are 6 units-1263 MW and 15units-2630 MW. …”
Get full text
-
324
A fix and optimize method based approximate dynamic programming approach for the strategic fleet sizing and delivery planning problem
Published 2024“…In this study, we suggest an approximate Dynamic Programming algorithm, with a look ahead strategy, that uses the fix and optimize method as the imbedded heuristic for solving integrated fleet composition and replenishment planning problem. …”
-
325
Performance comparison of variable-stepsize IMEX SBDF methods on advection-diffusion-reaction models
Published 2025“…We develop an adaptive time-stepping and error control algorithm for VSSBDF methods up to fourth order based on a step-doubling refinement technique using estimates of the local truncation errors. …”
-
326
Performance comparison of variable-stepsize IMEX SBDF methods on advection-diffusion-reaction models
Published 2025“…We develop an adaptive time-stepping and error control algorithm for VSSBDF methods up to fourth order based on a step-doubling refinement technique using estimates of the local truncation errors. …”
-
327
PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits
Published 2022“…Implications are that toxicity trigger detection algorithms can leverage generic approaches but must also tailor detections to specific communities.…”
-
328
Developing a UAE-Based Disputes Prediction Model using Machine Learning
Published 2022Get full text
doctoralThesis -
329
-
330
Resilience analytics: coverage and robustness in multi-modal transportation networks
Published 2018“…A future goal is to use this experience to make projections for a fast growing city like Doha.…”
-
331
MoveSchedule
Published 1995“…The layout construction algorithm that underlies MoveSchedule uses Constraint Satisfaction to find the set of all positions that meet the constraints on resources' positions and Linear Programming to find the optimal positions that minimize resource transportation and relocation costs. …”
Get full text
Get full text
Get full text
masterThesis -
332
PAST-AI: Physical-Layer Authentication of Satellite Transmitters via Deep Learning
Published 2022“…<p dir="ltr">Physical-layer security is regaining traction in the research community, due to the performance boost introduced by deep learning classification algorithms. This is particularly true for sender authentication in wireless communications via radio fingerprinting. …”
-
333
Lung-EffNet: Lung cancer classification using EfficientNet from CT-scan images
Published 2023“…The class imbalance issue was handled through multiple data augmentation methods to overcome the biases. …”
-
334
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
335
Prediction the performance of multistage moving bed biological process using artificial neural network (ANN)
Published 2020“…<p dir="ltr">Complexity, uncertainty, and high dynamic nature of nutrient removal through biological processes (BPs) makes it difficult to model and control these processes, forcing designers to rely on approximations, probabilities, and assumptions. …”
-
336
Net energy–cost optimization of STPV–PDRC integrated greenhouses: Balancing energy production and cooling demand under crop-specific DLI constraints
Published 2025“…An improved equilibrium optimizer (IEO) algorithm was employed to solve the multi-objective problem. …”
-
337
A Fusion-Based Approach for Skin Cancer Detection Combining Clinical Images, Dermoscopic Images, and Metadata
Published 2025Get full text
doctoralThesis -
338
CEAP
Published 2016“…To reduce the overhead of the proposed detection model and make it feasible for the resource-constrained nodes, we reduce the size of the training dataset by (1) restricting the data collection, storage, and analysis to concern only a set of specialized nodes (i.e., Multi-Point Relays) that are responsible for forwarding packets on behalf of their clusters; and (2) migrating only few tuples (i.e., support vectors) from one detection iteration to another. …”
Get full text
Get full text
Get full text
Get full text
article -
339
-
340
Second-order conic programming for data envelopment analysis models
Published 2022“…Moreover, it presents an algorithm that solves the former problem, and provides a MATLAB function associated with it. …”
Get full text
Get full text