Search alternatives:
localization algorithm » pollination algorithm (Expand Search)
Showing 441 - 460 results of 529 for search '(( localization algorithm based ) OR ( optimization algorithm based ))*', query time: 0.07s Refine Results
  1. 441

    A comprehensive review of deep reinforcement learning applications from centralized power generation to modern energy internet frameworks by Sakib Mahmud (15302404)

    Published 2025
    “…We present a structured taxonomy covering value-based, policy-based, actor-critic, model-based, and advanced multi-agent and multi-objective approaches, and link algorithms to tasks such as dispatch, microgrid coordination, real-time pricing, load balancing, and demand–response. …”
  2. 442

    User-centric strategies for resource management in heterogeneous wireless networks with QoS considerations by Abbas, Nadine Fawaz

    Published 2017
    “…Due to the complexity of the problem, we design sub-optimal hierarchical tree-based algorithms for real-time operation taking into account realistic constraints. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  3. 443
  4. 444

    Traffic Offloading with Channel Allocation in Cache-Enabled Ultra-Dense Wireless Networks by Abbas, Nadine

    Published 2018
    “…We also propose efficient sub-optimal hierarchical tree-based algorithms that operate in real time with dynamic and fast solutions for ultra dense networks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 445

    A TABU SEARCH APPROACH TO THE CLUSTERING PROBLEM by AlSultan, K.S.

    Published 2020
    “…In this paper, we develop a new algorithm for solving this problem based on a tabu search technique. …”
    Get full text
    article
  6. 446
  7. 447

    Scatter search for homology modeling by Mansour, Nashat

    Published 2016
    “…However this technique suffers from poor initial target-template alignments. To improve homology based PSP, we propose a scatter search (SS) metaheuristic algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 448

    Designing Cellular Mobile Networks Using Non{Deterministic Iterative Heuristics by Sait, Sadiq M.

    Published 2020
    “…Hence, a randomized, heuristic algorithm, such as Simulated Evolution is used in this work to optimize the transmission costs in cellular networks. …”
    Get full text
    article
  9. 449
  10. 450

    A Stochastic Newton-Raphson Method with Noisy Function Measurements by Saab, Khaled Kamal

    Published 2016
    “…The development of the proposed optimal algorithm is based on minimizing a stochastic performance index. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 451

    Singularly perturbed nonlinear ODEs and interior point optimizationalgorithms by Ezzine, J.

    Published 1995
    “…This paper explores the continuous realizations of iterative processes emanating from interior point optimization algorithms, and their connection with nonlinear singularly-perturbed ordinary differential equations. …”
    Get full text
    Get full text
    article
  12. 452

    Optical character recognition on heterogeneous SoC for HD automatic number plate recognition system by Ali Farhat (1461478)

    Published 2018
    “…Typical ANPR systems are based on three stages: number plate localization (NPL), character segmentation (CS), and optical character recognition (OCR). …”
  13. 453

    A method for data path synthesis using neural networks by Harmanani, H.

    Published 2017
    “…A sequential simulator was implemented for the proposed algorithm on a Linux Pentium PC under X Windows. Several circuits hare been attempted, all yielding sub-optimal solutions.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  14. 454

    An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation by El-Maleh, Aiman H.

    Published 2001
    “…Evolutionary algorithms have been effective in solving many search and optimization problems. …”
    Get full text
    article
  15. 455

    Shuffled Linear Regression with Erroneous Observations by Saab, Samer S.

    Published 2019
    “…We propose an optimal recursive algorithm that updates the estimate from the underdetermined function that is based on that permutation-invariant constraint. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  16. 456

    Optimum Track to Track Fusion Using CMA-ES and LSTM Techniques by Fares, Samar

    Published 2024
    “…The first method uses an offline technique based on a global optimizer called the CMA-ES algorithm and the second one uses LSTM in its different forms to learn the online adjustment of the fusion weights between the two tracks. …”
    Get full text
  17. 457
  18. 458

    Turbo-charging dominating set with an FPT subroutine by Abu-Khzam, Faisal N.

    Published 2017
    “…Turbo-charging is a recent algorithmic technique that is based on the fixed-parameter tractability of the dynamic versions of some problems as a way to improve heuristics. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  19. 459

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology by Al-Hemairy, Moh'd Hussain

    Published 2010
    “…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
    Get full text
  20. 460

    Tracking and repairing damaged healthcare databases using the matrix by Haraty, Ramzi A.

    Published 2015
    “…The algorithm is based on data dependency and uses a single matrix. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article