-
441
A comprehensive review of deep reinforcement learning applications from centralized power generation to modern energy internet frameworks
Published 2025“…We present a structured taxonomy covering value-based, policy-based, actor-critic, model-based, and advanced multi-agent and multi-objective approaches, and link algorithms to tasks such as dispatch, microgrid coordination, real-time pricing, load balancing, and demand–response. …”
-
442
User-centric strategies for resource management in heterogeneous wireless networks with QoS considerations
Published 2017“…Due to the complexity of the problem, we design sub-optimal hierarchical tree-based algorithms for real-time operation taking into account realistic constraints. …”
Get full text
Get full text
Get full text
masterThesis -
443
Autonomous Vehicles Delivery Systems: Analyzing Vehicle Routing Problems with a Moving Depot
Published 2019Get full text
doctoralThesis -
444
Traffic Offloading with Channel Allocation in Cache-Enabled Ultra-Dense Wireless Networks
Published 2018“…We also propose efficient sub-optimal hierarchical tree-based algorithms that operate in real time with dynamic and fast solutions for ultra dense networks. …”
Get full text
Get full text
Get full text
Get full text
article -
445
A TABU SEARCH APPROACH TO THE CLUSTERING PROBLEM
Published 2020“…In this paper, we develop a new algorithm for solving this problem based on a tabu search technique. …”
Get full text
article -
446
Cooperative clustering models for Vehicular ad hoc networks. (c2013)
Published 2013Get full text
Get full text
masterThesis -
447
Scatter search for homology modeling
Published 2016“…However this technique suffers from poor initial target-template alignments. To improve homology based PSP, we propose a scatter search (SS) metaheuristic algorithm. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
448
Designing Cellular Mobile Networks Using Non{Deterministic Iterative Heuristics
Published 2020“…Hence, a randomized, heuristic algorithm, such as Simulated Evolution is used in this work to optimize the transmission costs in cellular networks. …”
Get full text
article -
449
Autonomous Demand-Side Management in the Future Smart Grid
Published 2016Get full text
doctoralThesis -
450
A Stochastic Newton-Raphson Method with Noisy Function Measurements
Published 2016“…The development of the proposed optimal algorithm is based on minimizing a stochastic performance index. …”
Get full text
Get full text
Get full text
Get full text
article -
451
Singularly perturbed nonlinear ODEs and interior point optimizationalgorithms
Published 1995“…This paper explores the continuous realizations of iterative processes emanating from interior point optimization algorithms, and their connection with nonlinear singularly-perturbed ordinary differential equations. …”
Get full text
Get full text
article -
452
Optical character recognition on heterogeneous SoC for HD automatic number plate recognition system
Published 2018“…Typical ANPR systems are based on three stages: number plate localization (NPL), character segmentation (CS), and optical character recognition (OCR). …”
-
453
A method for data path synthesis using neural networks
Published 2017“…A sequential simulator was implemented for the proposed algorithm on a Linux Pentium PC under X Windows. Several circuits hare been attempted, all yielding sub-optimal solutions.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
454
An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation
Published 2001“…Evolutionary algorithms have been effective in solving many search and optimization problems. …”
Get full text
article -
455
Shuffled Linear Regression with Erroneous Observations
Published 2019“…We propose an optimal recursive algorithm that updates the estimate from the underdetermined function that is based on that permutation-invariant constraint. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
456
Optimum Track to Track Fusion Using CMA-ES and LSTM Techniques
Published 2024“…The first method uses an offline technique based on a global optimizer called the CMA-ES algorithm and the second one uses LSTM in its different forms to learn the online adjustment of the fusion weights between the two tracks. …”
Get full text
-
457
Multi Agent Reinforcement Learning Approach for Autonomous Fleet Management
Published 2019Get full text
doctoralThesis -
458
Turbo-charging dominating set with an FPT subroutine
Published 2017“…Turbo-charging is a recent algorithmic technique that is based on the fixed-parameter tractability of the dynamic versions of some problems as a way to improve heuristics. …”
Get full text
Get full text
Get full text
conferenceObject -
459
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
Published 2010“…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
Get full text
-
460
Tracking and repairing damaged healthcare databases using the matrix
Published 2015“…The algorithm is based on data dependency and uses a single matrix. …”
Get full text
Get full text
Get full text
Get full text
article