Search alternatives:
learning algorithm » learning algorithms (Expand Search)
means algorithm » search algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data learning » deep learning (Expand Search)
Showing 641 - 660 results of 728 for search '(( elements means algorithm ) OR ((( data using algorithm ) OR ( data learning algorithm ))))', query time: 0.10s Refine Results
  1. 641

    Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks by Muhammed Al-Ali (16810677)

    Published 2023
    “…An optimal resource allocation scheme is proposed with two scenarios including a guaranteed fairness level and minimum data rate among eMBB users. In addition, a knapsack-inspired punctured resource allocation algorithm is proposed where the users’ channel qualities of both services are considered at each time slot leading to the most suitable Resource Block (RB) selection for puncturing in a way that minimizes the negative impact on eMBB performance. …”
  2. 642

    Uplink Noma in UAV-Assisted IoT Networks by Mrad, Ali

    Published 2022
    “…Given the complexity of the problem and the incomplete knowledge about the environment, the problem is divided into two subproblems: the first models the UAV trajectory and the selection of the first device in the NOMA cluster at each time slot as a Markov Decision Process, and uses Proximal Policy Optimization to solve it. The second device is then selected using a heuristic algorithm based on prioritizing devices with higher bit rate requirements and strict deadlines. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  3. 643

    Impacts of climate change on the global spread and habitat suitability of <i>Coxiella burnetii</i>: Future projections and public health implications by Abdallah Falah Mohammad Aldwekat (22457821)

    Published 2025
    “…</p><h3>Materials and methods</h3><p dir="ltr">An ensemble<u> species distribution modelling </u>approach, integrating regression-based and machine-learning algorithms (GLM, GBM, RF, MaxEnt), was used to project habitat suitability (Current time and by 2050, 2070, and 2090). …”
  4. 644

    Anonymizing multimedia documents by Haraty, Ramzi

    Published 2016
    “…In this paper, we propose de-linkability, a privacy-preserving constraint to bound the amount of information outsourced that can be used to re-identify individuals. We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 645

    MoveSchedule by Zouein, Pierette

    Published 1995
    “…MoveSchedule is validated using realistic project data and its solution is qualitatively assessed by an experienced engineer on that project.…”
    Get full text
    Get full text
    Get full text
    masterThesis
  6. 646
  7. 647

    An Infrastructure-Assisted Crowdsensing Approach for On-Demand Traffic Condition Estimation by Abdul Rahman, Sawsan

    Published 2019
    “…However, the current solutions proposed for the use of crowdsensing for the collection of traffic related data adopt an opportunistic continuous sensing approach, which entails high resource consumption on the server and mobile device side, a high communication overhead, while offering little control of the users over the sensing activity. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  8. 648

    Making progress with the automation of systematic reviews: principles of the International Collaboration for the Automation of Systematic Reviews (ICASR) by Elaine Beller (44602)

    Published 2018
    “…Recent advances in natural language processing, text mining and machine learning have produced new algorithms that can accurately mimic human endeavour in systematic review activity, faster and more cheaply. …”
  9. 649

    Active distribution network type identification method of high proportion new energy power system based on source-load matching by Qinlin, Shi

    Published 2023
    “…Firstly, the typical daily output scenarios of DG are extracted by clustering method, and the generalized load curve model is solved by the optimization algorithm to obtain the source load operation data; Secondly, calculate the source-load matching indicators (including matching performance, matching degree, and matching rate) according to the source load data of each region, and identify the distribution network type according to the range of the index values; Finally, several indicators are introduced to quantify the characteristics of different types of distribution networks. …”
    Get full text
    Get full text
    Get full text
    article
  10. 650

    ARDENT: A Proactive Agent-Based Routing Protocol for Internet of Vehicles by Mazouzi, Mohamed

    Published 2023
    “…The design of an efficient routing algorithm for the Internet of Vehicles (IoV) poses several problems due to its special characteristics, including nodes high-speed mobility, frequent topology change, link instability, and the presence of radio obstacles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 651
  12. 652

    Decomposition-based wind power forecasting models and their boundary issue: An in-depth review and comprehensive discussion on potential solutions by Yinsong Chen (16685508)

    Published 2022
    “…These methods generally disaggregate the original time series data into sub-time-series with better stationarity, and then the target data is predicted based on the sub-series. …”
  13. 653
  14. 654

    A survey and comparison of wormhole routing techniques in a meshnetworks by Al-Tawil, K.M.

    Published 1997
    “…Although an extremely wide number of routing algorithms have been proposed and implemented in hardware and software, it is difficult for the designer of a multicomputer to choose the best routing algorithm given a particular architectural configuration. …”
    Get full text
    Get full text
    article
  15. 655
  16. 656
  17. 657
  18. 658

    Dataset built for Arabic Sentiment Analysis by AL MUKHAITI, AYESHA JUMAA SALEM

    Published 2016
    “…Key stages of the framework takes three dimensions. We followed an Algorithm which involves Data Acquisition stage, Filtering Stage and Annotation Stage. …”
    Get full text
  19. 659

    Inferential sensing techniques in industrial applications by Shakil,, Muhammad

    Published 0007
    “…Real data from a boiler plant is used to develop the model. …”
    Get full text
    masterThesis
  20. 660

    Molecular Classification of Breast Cancer Utilizing Long Non-Coding RNA (lncRNA) Transcriptomes Identifies Novel Diagnostic lncRNA Panel for Triple-Negative Breast Cancer by Hibah Shaath (5599658)

    Published 2021
    “…The Marker Finder algorithm identified the lncRNA transcript panel most associated with each molecular subtype and the receiver operating characteristic (ROC) analysis was used to validate the diagnostic potential (area under the curve (AUC) of ≥8.0 and p value < 0.0001). …”