-
441
Quality Degradation And Pricing of Perishable Food Products
منشور في 2024احصل على النص الكامل
doctoralThesis -
442
-
443
MoveSchedule
منشور في 1995"…The layout construction algorithm that underlies MoveSchedule uses Constraint Satisfaction to find the set of all positions that meet the constraints on resources' positions and Linear Programming to find the optimal positions that minimize resource transportation and relocation costs. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
444
-
445
Deep Neural Networks for Electromagnetic Inverse Scattering Problems in Microwave Imaging
منشور في 2023احصل على النص الكامل
doctoralThesis -
446
Enhancing building sustainability: A Digital Twin approach to energy efficiency and occupancy monitoring
منشور في 2024"…Our data-driven occupancy detection approach utilized Machine Learning (ML) algorithms to intelligently determine room occupancy, allowing for precise energy management based on real-time usage patterns. …"
-
447
Microwave brain imaging system to detect brain tumor using metamaterial loaded stacked antenna array
منشور في 2022"…Later, a nine-antenna array-based microwave brain imaging (MBI) system is implemented and investigated by using phantom model. …"
-
448
Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates
منشور في 2022"…</p> <h2>Methods</h2> <p>To demonstrate the approach, we cutout zigzag resonators in a thin aluminium plate that is subjected to base-excitations. The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …"
-
449
3D deployment of UAVs in wireless networks for traffic offloading and edge computing. (c2019)
منشور في 2019"…This being said, computation tasks generated by IoT devices can be pro- cessed in less latency and with much lower energy consumption at the devices. To optimally deploy UAVs as mounted cloudlets, we formulate our problem as mixed integer program and then use an e cient meta-heuristic algorithm to generate optimized results for large scale IoT networks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
450
Just-in-time defect prediction for mobile applications: using shallow or deep learning?
منشور في 2023"…Experimental results demonstrated that DL algorithms leveraging sampling methods perform significantly worse than the decision tree-based ensemble method. …"
-
451
From Collatz Conjecture to chaos and hash function
منشور في 2023"…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …"
-
452
On the Provisioning of Ultra-Reliable Low-Latency Services in IoT Networks with Multipath Diversity
منشور في 2020"…We de ne the constraints of the problem, model it as a Markov Decision Process, and propose a reinforcement learning-based solution to optimize the UAV trajectory. Simulation results are presented for both parts of the thesis to illustrate the effectiveness of the proposed solutions and algorithms in comparison with optimal solutions and baseline algorithms.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
453
Tuning of a fuzzy logic power system stabilizer using geneticalgorithms
منشور في 1997"…The proposed approach uses genetic algorithms (GA) to search for optimal or near optimal settings of fuzzy logic power system stabilizer (FLPSS) parameters. …"
احصل على النص الكامل
احصل على النص الكامل
article -
454
Advancing Coherent Power Grid Partitioning: A Review Embracing Machine and Deep Learning
منشور في 2025"…Subsequently, state-of-the-art research that envisions the use of clustering-based machine learning and deep learning-based solutions for PGP is presented. …"
-
455
Towards Multimedia Fragmentation
منشور في 2006"…We particularly discuss multimedia primary horizontal fragmentation and provide a partitioning strategy based on low-level multi-media features. Our approach particularly emphasizes the importance of multimedia predicates implications in optimizing multimedia fragments. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
456
Predicting Android Malware Using Evolution Networks
منشور في 2025"…We combine this model with genetic algorithms to optimize its parameters and return the best state transition probabilities, and we predict future malware accordingly. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
457
SemIndex: Semantic-Aware Inverted Index
منشور في 2017"…Preliminary results have demonstrated the effectiveness, scalability and optimality of our approach.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
458
A fine-grained XML structural comparison approach
منشور في 2007"…Our approach consists of two main algorithms for discovering the structural commonality between sub-trees and computing tree-based edit operations costs. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
459
An XML Document Comparison Framework
منشور في 2001"…As the Web continues to grow and evolve, more and more information is being placed in structurally rich documents, XML documents in particular, so as to improve the efficiency of similarity clustering, information retrieval and data management applications. Various algorithms for comparing hierarchically structured data, e.g., XML documents, have been proposed in the literature. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
460
A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques
منشور في 2022"…The findings include that the main research area in phishing detection studies is feature extraction and selection, followed by methods for classifying and optimizing the detection of phishing emails. Amongst the range of classification algorithms, support vector machines (SVMs) are heavily utilised for detecting phishing emails. …"
احصل على النص الكامل
احصل على النص الكامل