Search alternatives:
implementing context » implementing iot (Expand Search)
context algorithm » control algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
element » elements (Expand Search)
implementing context » implementing iot (Expand Search)
context algorithm » control algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
element » elements (Expand Search)
-
1
Bird’s Eye View feature selection for high-dimensional data
Published 2023“…BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …”
-
2
Particle swarm optimization algorithm: review and applications
Published 2024“…Particle swarm optimization (PSO) is a heuristic global optimization technique and an optimization algorithm that is swarm intelligence-based. It is based on studies into the movement of bird flocks. …”
Get full text
-
3
RHEEMix in the data jungle: a cost-based optimizer for cross-platform systems.
Published 2020“…Our main contributions are: (i) a mechanism based on graph transformations to explore alternative execution strategies; (ii) a novel graph-based approach to determine efficient data movement plans among subtasks and platforms; and (iii) an efficient plan enumeration algorithm, based on a novel enumeration algebra. …”
-
4
-
5
-
6
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
Published 2023“…<p dir="ltr">There is a need of secure and robust encryption algorithm that can be implemented on each and diverse software and hardware platforms. …”
-
7
Towards Scalable Process Mining Pipelines
Published 2023“…Contributions have covered the spectrum of better algorithms, richer comparison metrics, and movement towards online analysis for process data. …”
Get full text
Get full text
Get full text
-
8
-
9
-
10
Correlation Clustering via s-Club Cluster Edge Deletion
Published 2023“…In addition, we implement this 3CCED algorithm in the heuristic approach and compare the experiments to Cluster Editing and 2CCED. …”
Get full text
Get full text
Get full text
masterThesis -
11
-
12
Real-Time Path-Planning using Depth/INS Sensor Fusion for Localization
Published 2019Get full text
doctoralThesis -
13
Design of A Theoretical Framework For A Real-Time Fire Evacuation Guidance System
Published 2020Get full text
doctoralThesis -
14
Solar power forecasting beneath diverse weather conditions using GD and LM-artificial neural networks
Published 2023“…A case study has been done in the Peer Panjal region. The data collected for four months with various parameters have been applied randomly as input data using GD and LM type of artificial neural network compared to actual solar energy data. …”
Get full text
-
15
Automated skills assessment in open surgery: A scoping review
Published 2025“…The assessment input for the automation algorithms were predominantly hand movement. Around 37.5 % (<i>n </i>= 15) of the studies assessed algorithm performance using classification accuracy. …”
-
16
Performance Analysis of Artificial Neural Networks in Forecasting Financial Time Series
Published 2013Get full text
doctoralThesis -
17
Spherical cavity-expansion forcing function in PRONTO 3D for application to penetration problems
Published 2017“…In certain penetration events the primary mode of deformation of the target can be approximated by known analytical expressions. In the context of an analysis code, this approximation eliminates the need for modeling the target as well as the need for a contact algorithm. …”
Get full text
Get full text
Get full text
conferenceObject -
18
Developing a framework for using face recognition in transit payment transactions
Published 2021“…The second solution is proposed based on implementing a dedicated full HD face recognition stereo camera system on top of each metro gate and integrate it with the recommended “Banking Payment Context- Account Based Ticketing System” by using the MFcoface face recognition method which results from the systematic literature review and experts’ outcomes. …”
Get full text
-
19
Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles
Published 2000“…In certain penetration events it is proposed that the primary mode of deformation of the target can be approximated by known analytical expressions. In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. …”
Get full text
Get full text
Get full text
article -
20
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
Published 2021“…This risk is specifically eminent in monitoring data transmission traffic, espionage, troop movement, border surveillance, searching, and warfare battlefield phenomenon, etc. …”