Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
-
181
A Survey of Audio Enhancement Algorithms for Music, Speech, Bioacoustics, Biomedical, Industrial, and Environmental Sounds by Image U-Net
Published 2023“…Different than other published reviews, this review focuses entirely on AE techniques based on image U-Nets. We will discuss the need for AE, U-Net comparison to other DNNs, the benefits of converting the audio to 2D, input representations that are useful for different AE applications, the architecture of vanilla U-Net and the pre-trained models, variations in vanilla architecture incorporated in different E models, and the state-of-the-art AE algorithms based on U-Net in various applications. …”
-
182
An efficient failure-resilient mutual exclusion algorithm for distributed systems leveraging a novel zero-message overlay structure
Published 2024“…<p>In this paper, we provide a novel failure-resilient token-based mutual exclusion (ME) algorithm for distributed systems. …”
-
183
CoLoSSI: Multi-Robot Task Allocation in Spatially-Distributed and Communication Restricted Environments
Published 2024“…We propose a cooperative, load-balancing task allocation and scheduling algorithm based on sequential single-item auctions (CoLoSSI) that explicitly considers the non-atomicity of tasks, promotes synergies between agents, and enables cooperation while maintaining computational tractability. …”
-
184
Multi-Objective Optimisation of Injection Moulding Process for Dashboard Using Genetic Algorithm and Type-2 Fuzzy Neural Network
Published 2024“…Computational techniques, like the finite element method, are used to analyse behaviours based on varied input parameters. A CAD model of a dashboard part is incorporated into a finite element analysis to measure shear and residual stresses. …”
-
185
-
186
Blue collar laborers’ travel pattern recognition: Machine learning classifier approach
Published 2021“…Raw data preprocessing and outliers detection and filtering algorithms were applied at the first stage of the analysis, and consequently, an activity-based travel matrix was developed for each household. …”
-
187
Protein structure prediction in the 3D HP model
Published 2009“…In this paper, we present a Particle Swarm Optimization (PSO) based algorithm for predicting protein structures in the 3D HP model. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
188
A Blockchain Model for Secure Communications in Internet of Vehicles
Published 2021“…In this paper, we present a framework for secure IoV communications by utilizing the High Performance Blockchain Consensus (HPBC) algorithm. Based on a previously published communication model for VANETs that uses an efficient routing protocol for transmitting packets between vehicles, we describe in this paper how to integrate a blockchain model on top of the IoV communications system. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
189
Enhanced Deep Belief Network Based on Ensemble Learning and Tree-Structured of Parzen Estimators: An Optimal Photovoltaic Power Forecasting Method
Published 2021“…The proposed forecasting tool incorporates a base model and meta-model layers. The first-layer base learner combines extreme learning machines, extremely randomized trees, k-nearest neighbor, and mondrian forest models. …”
-
190
Three approaches to modelling heating and evaporation of monocomponent droplets
Published 2024“…<p>Three approaches to modelling the heating and evaporation of monocomponent droplets are compared. …”
-
191
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
192
DSDM: A Distributed Service Discovery Model for Manets
Published 2008“…The designed system is based on storing service descriptions in selected nodes that are searched in accordance to a proposed Minimum Distance Packet Forwarding (MDPF) algorithm. …”
Get full text
Get full text
Get full text
Get full text
article -
193
Improving MRI Resolution: A Cycle Consistent Generative Adversarial Network-Based Approach for 3T to 7T Translation
Published 2024“…Efforts are underway to develop algorithms that can generate 7T MRI from 3T MRI to achieve better image quality without the need for 7T MRI machines. …”
-
194
Modeling and Identification of Nonlinear DC Motor Drive Systems Using Recurrent Wavelet Networks
Published 2013Get full text
doctoralThesis -
195
A Literature Review on System Dynamics Modeling for Sustainable Management of Water Supply and Demand
Published 2023“…The models included agent-based modeling (ABM), Bayesian networking (BN), analytical hierarchy approach (AHP), and simulation optimization multi-objective optimization (MOO). …”
-
196
Artificial Intelligence (AI) based machine learning models predict glucose variability and hypoglycaemia risk in patients with type 2 diabetes on a multiple drug regimen who fast d...
Published 2020“…<h3>Objective</h3><p dir="ltr">To develop a machine-based algorithm from clinical and demographic data, physical activity and glucose variability to predict hyperglycaemic and hypoglycaemic excursions in patients with type 2 diabetes on multiple glucose lowering therapies who fast during Ramadan.…”
-
197
Predicting the Heats of Fusion of Ionic Liquids via Group Contribution Modeling and Machine Learning
Published 2022Get full text
doctoralThesis -
198
UML-based regression testing for OO software
Published 2010“…For the second phase, we present algorithms for detecting system level changes in the interaction overview diagram. …”
Get full text
Get full text
Get full text
article -
199
Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT
Published 2021“…Additionally, by introducing the authentication mechanism based on transfer learning, blockchains can enhance the preservation and security standards for industrial applications. …”
-
200
Regression testing web services-based applications
Published 2006Get full text
Get full text
Get full text
Get full text
conferenceObject