Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
deer algorithm » search algorithm (Expand Search)
elements deer » elementi per (Expand Search)
Showing 501 - 515 results of 515 for search '(( elements deer algorithm ) OR ((( data processing algorithm ) OR ( solved using algorithm ))))', query time: 0.10s Refine Results
  1. 501

    A systematic review of recent advances in the application of machine learning in membrane-based gas separation technologies by Farideh Abdollahi (22303153)

    Published 2024
    “…The fingerprinting and descriptors are two commonly approach for polymer featurization. In terms of algorithms, <u>neural networks</u> (NNs), random forest (RF), and gaussian process regression (GPR) are among the most extensively applied methods. …”
  2. 502

    Decision-level fusion for single-view gait recognition with various carrying and clothing conditions by Al-Tayyan, Amer

    Published 2017
    “…Such a system is needed in access control applications whereby a single view is imposed by the system setup. The gait data is firstly processed using three gait representation methods as the features sources; Accumulated Prediction Image (API) and two new gait representations namely; Accumulated Flow Image (AFI) and Edge-Masked Active Energy Image (EMAEI). …”
    Get full text
    article
  3. 503

    Deep Learning in Smart Grid Technology: A Review of Recent Advancements and Future Prospects by Mohamed Massaoudi (16888710)

    Published 2021
    “…This ongoing transition undergoes rapid changes, requiring a plethora of advanced methodologies to process the big data generated by various units. In this context, SG stands tied very closely to Deep Learning (DL) as an emerging technology for creating a more decentralized and intelligent energy paradigm while integrating high intelligence in supervisory and operational decision-making. …”
  4. 504

    Using artificial bee colony to optimize software quality estimation models. (c2015) by Abou Assi, Tatiana Antoine

    Published 2016
    “…We validate our technique on data describing maintainability and reliability of classes in an Object-Oriented system. …”
    Get full text
    Get full text
    masterThesis
  5. 505

    Optimal Trajectory and Positioning of UAVs for Small Cell HetNets: Geometrical Analysis and Reinforcement Learning Approach by Mohammad Taghi Dabiri (16904658)

    Published 2023
    “…We then formulate the problem for UAV trajectory to minimize the maximum outage probability (OP) of directional THz links. Then, using geometrical analysis and deep reinforcement learning (RL) method, we propose several algorithms to find the optimal trajectory and select an optimal pattern during the trajectory. …”
  6. 506

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
  7. 507

    ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks by Muhammad Asif Khan (7367468)

    Published 2022
    “…Recently, cognitive network architectures using sophisticated learning techniques are increasingly being applied to such problems. …”
  8. 508
  9. 509
  10. 510
  11. 511

    Industrial Internet of Things enabled technologies, challenges, and future directions by Shams Forruque, Ahmed

    Published 2023
    “…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …”
    Get full text
    Get full text
    Get full text
    article
  12. 512
  13. 513
  14. 514

    Scatter search technique for exam timetabling by Mansour, Nashat

    Published 2011
    “…These constraints are conflicting, which makes exam timetabling intractable. Hence, solving this problem in realistic time requires the use of heuristic approaches. …”
    Get full text
    Get full text
    Get full text
    article
  15. 515

    Industrial Internet of Things enabled technologies, challenges, and future directions by Shams Forruque Ahmed (16517712)

    Published 2023
    “…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …”