Search alternatives:
optimisation algorithm » optimization algorithms (Expand Search), pollination algorithm (Expand Search)
zebra » debra (Expand Search), zehra (Expand Search)
optimisation algorithm » optimization algorithms (Expand Search), pollination algorithm (Expand Search)
zebra » debra (Expand Search), zehra (Expand Search)
-
441
Quality Degradation And Pricing of Perishable Food Products
Published 2024Get full text
doctoralThesis -
442
-
443
MoveSchedule
Published 1995“…The layout construction algorithm that underlies MoveSchedule uses Constraint Satisfaction to find the set of all positions that meet the constraints on resources' positions and Linear Programming to find the optimal positions that minimize resource transportation and relocation costs. …”
Get full text
Get full text
Get full text
masterThesis -
444
Predicting Compression Modes and Split Decisions for HEVC Video Coding Using Machine Learning Techniques
Published 2017Get full text
doctoralThesis -
445
Deep Neural Networks for Electromagnetic Inverse Scattering Problems in Microwave Imaging
Published 2023Get full text
doctoralThesis -
446
Enhancing building sustainability: A Digital Twin approach to energy efficiency and occupancy monitoring
Published 2024“…Our data-driven occupancy detection approach utilized Machine Learning (ML) algorithms to intelligently determine room occupancy, allowing for precise energy management based on real-time usage patterns. …”
-
447
Microwave brain imaging system to detect brain tumor using metamaterial loaded stacked antenna array
Published 2022“…Later, a nine-antenna array-based microwave brain imaging (MBI) system is implemented and investigated by using phantom model. …”
-
448
Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates
Published 2022“…</p> <h2>Methods</h2> <p>To demonstrate the approach, we cutout zigzag resonators in a thin aluminium plate that is subjected to base-excitations. The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …”
-
449
3D deployment of UAVs in wireless networks for traffic offloading and edge computing. (c2019)
Published 2019“…This being said, computation tasks generated by IoT devices can be pro- cessed in less latency and with much lower energy consumption at the devices. To optimally deploy UAVs as mounted cloudlets, we formulate our problem as mixed integer program and then use an e cient meta-heuristic algorithm to generate optimized results for large scale IoT networks. …”
Get full text
Get full text
Get full text
masterThesis -
450
Just-in-time defect prediction for mobile applications: using shallow or deep learning?
Published 2023“…Experimental results demonstrated that DL algorithms leveraging sampling methods perform significantly worse than the decision tree-based ensemble method. …”
-
451
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
452
On the Provisioning of Ultra-Reliable Low-Latency Services in IoT Networks with Multipath Diversity
Published 2020“…We de ne the constraints of the problem, model it as a Markov Decision Process, and propose a reinforcement learning-based solution to optimize the UAV trajectory. Simulation results are presented for both parts of the thesis to illustrate the effectiveness of the proposed solutions and algorithms in comparison with optimal solutions and baseline algorithms.…”
Get full text
Get full text
Get full text
masterThesis -
453
Tuning of a fuzzy logic power system stabilizer using geneticalgorithms
Published 1997“…The proposed approach uses genetic algorithms (GA) to search for optimal or near optimal settings of fuzzy logic power system stabilizer (FLPSS) parameters. …”
Get full text
Get full text
article -
454
Advancing Coherent Power Grid Partitioning: A Review Embracing Machine and Deep Learning
Published 2025“…Subsequently, state-of-the-art research that envisions the use of clustering-based machine learning and deep learning-based solutions for PGP is presented. …”
-
455
Towards Multimedia Fragmentation
Published 2006“…We particularly discuss multimedia primary horizontal fragmentation and provide a partitioning strategy based on low-level multi-media features. Our approach particularly emphasizes the importance of multimedia predicates implications in optimizing multimedia fragments. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
456
Predicting Android Malware Using Evolution Networks
Published 2025“…We combine this model with genetic algorithms to optimize its parameters and return the best state transition probabilities, and we predict future malware accordingly. …”
Get full text
Get full text
Get full text
masterThesis -
457
SemIndex: Semantic-Aware Inverted Index
Published 2017“…Preliminary results have demonstrated the effectiveness, scalability and optimality of our approach.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
458
A fine-grained XML structural comparison approach
Published 2007“…Our approach consists of two main algorithms for discovering the structural commonality between sub-trees and computing tree-based edit operations costs. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
459
An XML Document Comparison Framework
Published 2001“…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …”
Get full text
Get full text
Get full text
article -
460
A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques
Published 2022“…The findings include that the main research area in phishing detection studies is feature extraction and selection, followed by methods for classifying and optimizing the detection of phishing emails. Amongst the range of classification algorithms, support vector machines (SVMs) are heavily utilised for detecting phishing emails. …”
Get full text
Get full text