Search alternatives:
implementing context » implementing iot (Expand Search)
context algorithm » control algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
rl algorithm » rd algorithm (Expand Search), carlo algorithm (Expand Search), _ algorithms (Expand Search)
element » elements (Expand Search)
implementing context » implementing iot (Expand Search)
context algorithm » control algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
rl algorithm » rd algorithm (Expand Search), carlo algorithm (Expand Search), _ algorithms (Expand Search)
element » elements (Expand Search)
-
21
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
Published 2021“…This risk is specifically eminent in monitoring data transmission traffic, espionage, troop movement, border surveillance, searching, and warfare battlefield phenomenon, etc. …”
-
22
Mobile Energy Storage Systems for Benefit Maximization in Resilient Smart Grids
Published 2025Get full text
doctoralThesis -
23
Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks
Published 2022“…The proposed analytical approach, along with the simulation, are implemented in a real case study of a steel manufacturing setup. …”
-
24
Modelling Exchange Rates during Currency Crisis using Neural Networks
Published 2006“…The models are built using the feedforward ANN structure trained by the backpropagation algorithm. Exchange rate data from the Lebanese currency crisis period of 1985-1992 is used for training, testing and evaluation of the models. …”
Get full text
Get full text
Get full text
conferenceObject -
25
AI-based remaining useful life prediction and modelling of seawater desalination membranes
Published 2024Get full text
doctoralThesis -
26
Detection of statistically significant network changes in complex biological networks
Published 2017“…Moreover, the structure of the proposed algorithm allows for a faster parallelized implementation.…”
-
27
Enhancing e-learning through AI: advanced techniques for optimizing student performance
Published 2024“…The findings demonstrate that CNN outperformed other deep learning and machine learning algorithms in terms of accuracy during the prediction phase, showcasing the advanced capabilities of AI in educational contexts. …”
-
28
Just-in-time defect prediction for mobile applications: using shallow or deep learning?
Published 2023“…Traditional machine learning-based defect prediction models have been built since the early 2000s, and recently, deep learning-based models have been designed and implemented. While deep learning (DL) algorithms can provide state-of-the-art performance in many application domains, they should be carefully selected and designed for a software engineering problem. …”
-
29
A Cyber-Physical System and Graph-Based Approach for Transportation Management in Smart Cities
Published 2021“…The system makes use of travel-time, traffic intensity, vehicle’s speed, and current road conditions to construct a weighted city graph representing the road network. Traditional graph algorithms with efficient implementation technologies are employed to respond to commuters’ and authorities’ needs in order to achieve a smart and optimum transportation system. …”
-
30
Teachers' Perceptions of the Role of Artificial Intelligence in Facilitating Inclusive Practices for Students with Special Educational Needs and Disabilities: A Case Study in a Pri...
Published 2025“…This study contributes to the literature by offering practical insights into the use of AI for inclusive education and as well outlining key challenges that must be addressed in order to get effective AI implementation. The significance of this research stems from its focus on a rarely explored context providing valuable insights into how AI can be leveraged to enhance inclusive education in similar educational settings. …”
Get full text
-
31
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
Published 2024“…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …”
-
32