Showing 21 - 32 results of 32 for search '(( implementing context algorithm ) OR ((( movement data algorithm ) OR ( element rl algorithm ))))', query time: 0.10s Refine Results
  1. 21

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone by Saeed Ullah Jan (9079260)

    Published 2021
    “…This risk is specifically eminent in monitoring data transmission traffic, espionage, troop movement, border surveillance, searching, and warfare battlefield phenomenon, etc. …”
  2. 22
  3. 23

    Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks by Mohamed Amjath (17542512)

    Published 2022
    “…The proposed analytical approach, along with the simulation, are implemented in a real case study of a steel manufacturing setup. …”
  4. 24

    Modelling Exchange Rates during Currency Crisis using Neural Networks by Nasr, G. E.

    Published 2006
    “…The models are built using the feedforward ANN structure trained by the backpropagation algorithm. Exchange rate data from the Lebanese currency crisis period of 1985-1992 is used for training, testing and evaluation of the models. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  5. 25
  6. 26

    Detection of statistically significant network changes in complex biological networks by Raghvendra Mall (581171)

    Published 2017
    “…Moreover, the structure of the proposed algorithm allows for a faster parallelized implementation.…”
  7. 27

    Enhancing e-learning through AI: advanced techniques for optimizing student performance by Rund Mahafdah (21399854)

    Published 2024
    “…The findings demonstrate that CNN outperformed other deep learning and machine learning algorithms in terms of accuracy during the prediction phase, showcasing the advanced capabilities of AI in educational contexts. …”
  8. 28

    Just-in-time defect prediction for mobile applications: using shallow or deep learning? by Raymon van Dinter (10521952)

    Published 2023
    “…Traditional machine learning-based defect prediction models have been built since the early 2000s, and recently, deep learning-based models have been designed and implemented. While deep learning (DL) algorithms can provide state-of-the-art performance in many application domains, they should be carefully selected and designed for a software engineering problem. …”
  9. 29

    A Cyber-Physical System and Graph-Based Approach for Transportation Management in Smart Cities by Muhammad Mazhar Rathore (17051745)

    Published 2021
    “…The system makes use of travel-time, traffic intensity, vehicle’s speed, and current road conditions to construct a weighted city graph representing the road network. Traditional graph algorithms with efficient implementation technologies are employed to respond to commuters’ and authorities’ needs in order to achieve a smart and optimum transportation system. …”
  10. 30

    Teachers' Perceptions of the Role of Artificial Intelligence in Facilitating Inclusive Practices for Students with Special Educational Needs and Disabilities: A Case Study in a Pri... by BACHIR, HIBAH AHMAD

    Published 2025
    “…This study contributes to the literature by offering practical insights into the use of AI for inclusive education and as well outlining key challenges that must be addressed in order to get effective AI implementation. The significance of this research stems from its focus on a rarely explored context providing valuable insights into how AI can be leveraged to enhance inclusive education in similar educational settings. …”
    Get full text
  11. 31

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices by Neder Karmous (19743430)

    Published 2024
    “…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …”
  12. 32