Showing 81 - 100 results of 234 for search '(( elements would algorithm ) OR ((( data code algorithm ) OR ( based finding algorithm ))))', query time: 0.13s Refine Results
  1. 81
  2. 82

    Optimum sensors allocation for drones multi-target tracking under complex environment using improved prairie dog optimization by Abu Zitar, Raed

    Published 2024
    “…The proposed simulated model can find the most relevant sensor(s) capable of generating the best quality tracks based on weighted distance criteria (Euclidean and Mahalanobis ). …”
    Get full text
  3. 83

    A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method by Amit Kumar Balyan (18288964)

    Published 2022
    “…To deal with the data-imbalance issue, this research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization(EGA-PSO) and improved random forest (IRF) methods. …”
  4. 84

    DRL-Based IRS-Assisted Secure Visible Light Communications by Danya A. Saifaldeen (19498705)

    Published 2022
    “…The DDPG-based algorithm provides an optimized solution that can adapt to the large size of design parameters and act fast to the channel variations due to users’ mobility. …”
  5. 85
  6. 86

    Deep learning-based user experience evaluation in distance learning by Rahim Sadigov (17714301)

    Published 2023
    “…More than 160,000 tweets, addressing conditions related to the major change in the education system, were gathered from Twitter social network and deep learning-based sentiment analysis models and topic models based on latent dirichlet allocation (LDA) algorithm were developed and analyzed. …”
  7. 87

    Practical Multiple Node Failure Recovery in Distributed Storage Systems by Itani, M.

    Published 2016
    “…The fractional repetition (FR) code is a class of regenerating codes that consists of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 88

    On-site workshop investment problem: A novel mathematical approach and solution procedure by Nima Moradi (19418821)

    Published 2023
    “…Next, due to the NP-hardness of the problem, an enhanced Genetic Algorithm (GA)-based metaheuristic with efficient problem-specific improvement rules as local search and effective crossover and mutation operators is proposed. …”
  9. 89

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …”
  10. 90

    A Hybrid Deep Learning Model Using CNN and K-Mean Clustering for Energy Efficient Modelling in Mobile EdgeIoT by Dhananjay Bisen (19482454)

    Published 2023
    “…This research proposed a hybrid model for energy-efficient cluster formation and a head selection (E-CFSA) algorithm based on convolutional neural networks (CNNs) and a modified k-mean clustering (MKM) method for MEC. …”
  11. 91
  12. 92

    Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants by Surbhi Choudhary (21633701)

    Published 2024
    “…It also provides implications for tech-managers and algorithm designers to build effective voice technology for superior user experience.…”
  13. 93

    Optimization of Piezoelectric Sensor-Actuator for Plate Vibration Control Using Evolutionary Computation: Modeling, Simulation and Experimentation by Asan G. A. Muthalif (16888818)

    Published 2021
    “…The analytical model is derived based on the Euler-Bernoulli model. The Optimal location of the collocated sensor-actuator, as well as PID controller gains, are determined using Ant Colony Optimization (ACO) technique, then compared with the Genetic Algorithm (GA) and enumerative method (EM). …”
  14. 94

    AI-Based Methods for Predicting Required Insulin Doses for Diabetic Patients by Azar, Danielle

    Published 2015
    “…In this paper, we propose and compare three techniques two of which are Artificial Intelligence techniques, namely C4.5 and Case-Based Reasoning, and the third one is a meta-heuristic namely genetic algorithms. …”
    Get full text
    Get full text
    article
  15. 95

    Energy Hub Optimal Scheduling and Management in the Day-Ahead Market Considering Renewable Energy Sources, CHP, Electric Vehicles, and Storage Systems Using Improved Fick’s Law Alg... by Ali S. Alghamdi (12722891)

    Published 2023
    “…In this paper, the scheduling and management framework of an energy hub (EH) is presented with the aim of energy profit maximization in partnership with electricity, natural gas, and district heating networks (EGHNs) considering the coordinated multi-energy management based on the day-ahead market. The optimum capacity of EH equipment, including photovoltaic and wind renewable energy sources, a combined heat and power system (CHP), a boiler, energy storage, and electric vehicles is determined in the day-ahead market using the improved Fick’s law algorithm (IFLA), considering the energy profit maximization and also satisfying the linear network and hub constraints. …”
  16. 96
  17. 97
  18. 98

    A heuristics for HTTP traffic identification in measuring user dissimilarity by Adeyemi R. Ikuesan (14157123)

    Published 2020
    “…The study utilizes HTTP request method of GET filtering, to develop a heuristic algorithm to identify user-initiated requests. The algorithm was experimentally tested on a group of users, to ascertain the certainty of identifying user-initiated requests. …”
  19. 99

    A 3-D vision-based man-machine interface for hand-controlled telerobot by Al-Mouhamed, M.A.

    Published 2005
    “…To determine the three-dimensional (3-D) position a tracking algorithm based on uncalibrated cameras with weak perspective projection model is used. …”
    Get full text
    Get full text
    article
  20. 100

    Secrecy Performance of Decode-and-Forward Based Hybrid RF/VLC Relaying Systems by Jaber Al-Khori (16855470)

    Published 2019
    “…We develop physical layer security algorithms that mitigate eavesdropping on both RF and VLC networks based on zero-forcing beamforming techniques. …”