بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
system » systems (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
system » systems (توسيع البحث)
-
161
The application of control algorithm for optimal performance of evaporatively-cooled façade system in hot dry and humid weathers
منشور في 2021"…The optimization of the system parameters is expected to overcome the limitations of using evaporative coolers in humid countries. …"
-
162
A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems
منشور في 2025"…Given that Android applications are frequent targets for malware, ensuring the integrity of FL-based malware detection systems is critical. We introduce an attack framework that integrates Genetic Algorithms (GA) with two prominent adversarial techniques, namely, the Fast Gradient Sign Method (FGSM) and Projected Gradient Descent (PGD), specifically designed for FL environments. …"
-
163
-
164
-
165
A Novel Genetic Trajectory Planning Algorithm With Variable Population Size for Multi-UAV-Assisted Mobile Edge Computing System
منشور في 2021"…In the first phase, a genetic algorithm (GA) with a variable population size is used to update the deployment of SPs. …"
-
166
-
167
-
168
Malicious URL and Intrusion Detection using Machine Learning
منشور في 2024"…Different ML algorithms were applied, namely Decision Tree (DT), K-Nearest Neighbors (KNN), Naive Bayes (NB) and Support Vector Machine (SVM). …"
احصل على النص الكامل
article -
169
-
170
Modeling and Control of Nonlinear Systems Using Wavelet Networks
منشور في 2006احصل على النص الكامل
doctoralThesis -
171
AI-Aided Robotic Wide-Range Water Quality Monitoring System
منشور في 2024احصل على النص الكامل
article -
172
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
منشور في 2007"…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
173
Degree-Based Network Anonymization
منشور في 2020احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
174
Logarithmic spiral search based arithmetic optimization algorithm with selective mechanism and its application to functional electrical stimulation system control
منشور في 2022"…The initial statistical and convergence profile assessment showed better performance of the proposed algorithm. The comparative analyses for transient and frequency responses were performed for the PID-controlled FES system using the original AOA, sine–cosine and particle swarm optimization algorithms and the traditional Ziegler-Nichols tuning scheme. …"
-
175
-
176
A Prioritized Uplink Call Admission Control Algorithm for 3G WCDMA Cellular Systems with Multi-Services
منشور في 2005"…The algorithm uses the effective load as an admission criterion and applies different thresholds for new and handoff calls. …"
احصل على النص الكامل
احصل على النص الكامل
article -
177
Machine learning based approaches for intelligent adaptation and prediction in banking business processes. (c2018)
منشور في 2018"…Companies, nowadays, rely on systems and applications to automate their business processes and data management. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
178
Distributed optimal coverage control in multi-agent systems: Known and unknown environments
منشور في 2024"…<p>This paper introduces a novel approach to solve the coverage optimization problem in multi-agent systems. The proposed technique offers an optimal solution with a lower cost with respect to conventional Voronoi-based techniques by effectively handling the issue of agents remaining stationary in regions void of information using a ranking function. …"
-
179
-
180