Search alternatives:
learning algorithm » learning algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
a learning » _ learning (Expand Search)
learning algorithm » learning algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
a learning » _ learning (Expand Search)
-
861
A new approach and faster exact methods for the maximum common subgraph problem
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
862
-
863
Spatiotemporal Mapping and Monitoring of Mangrove Forests Changes From 1990 to 2019 in the Northern Emirates, UAE Using Random Forest, Kernel Logistic Regression and Naive Bayes Tr...
Published 2020“…The approach was developed based on random forest (RF), Kernel logistic regression (KLR), and Naive Bayes Tree machine learning algorithms which use multitemporal Landsat images. …”
Get full text
article -
864
-
865
A hybrid approach for XML similarity
Published 2007“…Various algorithms for comparing hierarchically structured data, e.g. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
866
Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks
Published 2023“…An optimal resource allocation scheme is proposed with two scenarios including a guaranteed fairness level and minimum data rate among eMBB users. In addition, a knapsack-inspired punctured resource allocation algorithm is proposed where the users’ channel qualities of both services are considered at each time slot leading to the most suitable Resource Block (RB) selection for puncturing in a way that minimizes the negative impact on eMBB performance. …”
-
867
Uplink Noma in UAV-Assisted IoT Networks
Published 2022“…Given the complexity of the problem and the incomplete knowledge about the environment, the problem is divided into two subproblems: the first models the UAV trajectory and the selection of the first device in the NOMA cluster at each time slot as a Markov Decision Process, and uses Proximal Policy Optimization to solve it. The second device is then selected using a heuristic algorithm based on prioritizing devices with higher bit rate requirements and strict deadlines. …”
Get full text
Get full text
Get full text
masterThesis -
868
Modeling and thermoeconomic analysis of new polygeneration system based on geothermal energy with sea water desalination and hydrogen production
Published 2025“…The Grey Wolf Optimization (GWO) algorithm, which directs the system's optimization process, demonstrates a competitive trade-off between exergy efficiency, freshwater production, costs, NPV, and environmental impact. …”
-
869
User-centric strategies for resource management in heterogeneous wireless networks with QoS considerations
Published 2017“…We first design a learning-based approach for network selection where a user utilizes one wireless interface at a time to achieve either minimum energy consumption, maximum throughput or energy eciency based on user preferences. …”
Get full text
Get full text
Get full text
masterThesis -
870
Anonymizing multimedia documents
Published 2016“…In this paper, we propose de-linkability, a privacy-preserving constraint to bound the amount of information outsourced that can be used to re-identify individuals. We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …”
Get full text
Get full text
Get full text
Get full text
article -
871
MoveSchedule
Published 1995“…MoveSchedule is validated using realistic project data and its solution is qualitatively assessed by an experienced engineer on that project.…”
Get full text
Get full text
Get full text
masterThesis -
872
Test time minimization for system-on-chip with test bus assignment and sizin
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
873
Structural similarity evaluation between XML documents and DTDs
Published 2007“…The automatic processing and management of XML-based data are ever more popular research issues due to the increasing abundant use of XML, especially on the Web. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
874
An Infrastructure-Assisted Crowdsensing Approach for On-Demand Traffic Condition Estimation
Published 2019“…However, the current solutions proposed for the use of crowdsensing for the collection of traffic related data adopt an opportunistic continuous sensing approach, which entails high resource consumption on the server and mobile device side, a high communication overhead, while offering little control of the users over the sensing activity. …”
Get full text
Get full text
Get full text
Get full text
article -
875
Active distribution network type identification method of high proportion new energy power system based on source-load matching
Published 2023“…Firstly, the typical daily output scenarios of DG are extracted by clustering method, and the generalized load curve model is solved by the optimization algorithm to obtain the source load operation data; Secondly, calculate the source-load matching indicators (including matching performance, matching degree, and matching rate) according to the source load data of each region, and identify the distribution network type according to the range of the index values; Finally, several indicators are introduced to quantify the characteristics of different types of distribution networks. …”
Get full text
Get full text
Get full text
article -
876
ARDENT: A Proactive Agent-Based Routing Protocol for Internet of Vehicles
Published 2023“…The design of an efficient routing algorithm for the Internet of Vehicles (IoV) poses several problems due to its special characteristics, including nodes high-speed mobility, frequent topology change, link instability, and the presence of radio obstacles. …”
Get full text
Get full text
Get full text
Get full text
article -
877
Anomaly Detection Based Framework for Profile Monitoring
Published 2023Get full text
doctoralThesis -
878
Decomposition-based wind power forecasting models and their boundary issue: An in-depth review and comprehensive discussion on potential solutions
Published 2022“…These methods generally disaggregate the original time series data into sub-time-series with better stationarity, and then the target data is predicted based on the sub-series. …”
-
879
-
880
A survey and comparison of wormhole routing techniques in a meshnetworks
Published 1997“…Although an extremely wide number of routing algorithms have been proposed and implemented in hardware and software, it is difficult for the designer of a multicomputer to choose the best routing algorithm given a particular architectural configuration. …”
Get full text
Get full text
article