Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
selection using » detection using (Expand Search), prediction using (Expand Search), allocation using (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
selection using » detection using (Expand Search), prediction using (Expand Search), allocation using (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
-
201
-
202
Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks
Published 2023“…In addition, a knapsack-inspired punctured resource allocation algorithm is proposed where the users’ channel qualities of both services are considered at each time slot leading to the most suitable Resource Block (RB) selection for puncturing in a way that minimizes the negative impact on eMBB performance. …”
-
203
Evacuation of a highly congested urban city
Published 2017“…The algorithm uses Dijkstras algorithm to find the shortest path(s) and a modified greedy algorithm to assign maximum flows to selected paths given a specific schedule per time interval. …”
Get full text
Get full text
Get full text
conferenceObject -
204
Finetuning Analytics Information Systems for a Better Understanding of Users: Evidence of Personification Bias on Multiple Digital Channels
Published 2023“…The results show that despite using the same data and algorithm, varying the number of personas strongly biases the information system’s personification of the user population. …”
-
205
Multi-class subarachnoid hemorrhage severity prediction: addressing challenges in predicting rare outcomes
Published 2025“…In the first stage, we performed binary classification, grouping SAH severity into “Good Outcome” (class 0), which includes MRS levels 0, 1, 2, and 3, and “Poor Outcome” (class 1), encompassing levels 4, 5, and 6. Feature selection was done using a Random Forest algorithm to identify the top 20 features for the SAH severity prediction. …”
-
206
-
207
Multi-UAV-Enabled Mobile Edge Computing IoT Systems: Joint Association and Resource Allocation Framework
Published 2024Get full text
doctoralThesis -
208
Net energy–cost optimization of STPV–PDRC integrated greenhouses: Balancing energy production and cooling demand under crop-specific DLI constraints
Published 2025“…An improved equilibrium optimizer (IEO) algorithm was employed to solve the multi-objective problem. …”
-
209
A Multi-Channel Convolutional Neural Network approach to automate the citation screening process
Published 2021“…The citation screening process aims to identify the relevant primary studies fairly and with high rigor using selection criteria. Through the study selection criteria, reviewers determine whether an article should be included or excluded from the SLR. …”
-
210
-
211
Defining quantitative rules for identifying influential researchers: Insights from mathematics domain
Published 2024“…The rules were developed for each parameter category using the Decision Tree Algorithm, which achieved an average accuracy of 70 to 75 percent for identifying awardees in mathematics domains. …”
-
212
An Infrastructure-Assisted Crowdsensing Approach for On-Demand Traffic Condition Estimation
Published 2019“…Our approach combines the strengths of mobile crowdsensing, with the support of the mobile infrastructure, a multi-criteria algorithm for the participants' selection, and a deductive rule-based model for traffic condition estimation. …”
Get full text
Get full text
Get full text
Get full text
article -
213
A Biologicaly Inspired Decision Model for Multivariable Genetic- Fuzzy-AHP System
Published 2016“…This paper describes a hybridized intelligent algorithm as a tuning mechanism for one type of Genetic Fuzzy system termed the Genetic Fuzzimetric Technique (GFT). …”
Get full text
Get full text
Get full text
Get full text
article -
214
-
215
Oversampling techniques for imbalanced data in regression
Published 2024“…For tabular data, we also present the Auto-Inflater neural network, utilizing an exponential loss function for Autoencoders. …”
-
216
VHDRA: A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems
Published 2019“…VHDRA provides the following functionalities: (1) it vertically reduces the dataset features by selecting the most significant features and by reducing the NNGE’s hyperrectangles. (2) It horizontally reduces the size of data while preserving original key events and patterns within the datasets using an approach called STEM, State Tracking and Extraction Method. …”
-
217
-
218
Uplink Noma in UAV-Assisted IoT Networks
Published 2022“…The second device is then selected using a heuristic algorithm based on prioritizing devices with higher bit rate requirements and strict deadlines. …”
Get full text
Get full text
Get full text
masterThesis -
219
MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks
Published 2009“…The algorithm, which is called Minimum Distance Packet Forwarding (MDPF), uses routing information to select the node with the minimum distance. …”
Get full text
Get full text
Get full text
Get full text
article -
220
Analysis of Multi-User-Based UAV System With Outdated CSI
Published 2024“…To reduce the complexity and retain the MIMO gains, the transmit antenna selection (TAS) strategy is used to select the best antenna at the source and UAV nodes. …”