-
721
Tuning of a fuzzy logic power system stabilizer using geneticalgorithms
Published 1997“…The proposed approach uses genetic algorithms (GA) to search for optimal or near optimal settings of fuzzy logic power system stabilizer (FLPSS) parameters. …”
Get full text
Get full text
article -
722
Experimental evaluation of multi-agent reinforcement learning in real-world scale-free networks
Published 2010“…Multi-agent reinforcement learning is a common method for optimizing agents' local decision in a distributed and scalable manner. …”
Get full text
-
723
ISSP
Published 2017“…The underlying algorithms optimize positions of resources by minimizing handling and rehandling costs of these on site. …”
Get full text
Get full text
Get full text
conferenceObject -
724
Towards Multimedia Fragmentation
Published 2006“…In this paper, we address multimedia database fragmentation by extending existing fragmentation algorithms to take into account key characteristics of multimedia objects. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
725
Predicting the Release of Chemotherapeutics From the Core of Polymeric Micelles Using Ultrasound
Published 2015“…The proposed algorithms are first tested using a simulation environment. …”
Get full text
article -
726
Just-in-time defect prediction for mobile applications: using shallow or deep learning?
Published 2023“…Experimental results demonstrated that DL algorithms leveraging sampling methods perform significantly worse than the decision tree-based ensemble method. …”
-
727
A fine-grained XML structural comparison approach
Published 2007“…Our approach consists of two main algorithms for discovering the structural commonality between sub-trees and computing tree-based edit operations costs. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
728
On the Provisioning of Ultra-Reliable Low-Latency Services in IoT Networks with Multipath Diversity
Published 2020“…We de ne the constraints of the problem, model it as a Markov Decision Process, and propose a reinforcement learning-based solution to optimize the UAV trajectory. Simulation results are presented for both parts of the thesis to illustrate the effectiveness of the proposed solutions and algorithms in comparison with optimal solutions and baseline algorithms.…”
Get full text
Get full text
Get full text
masterThesis -
729
A Data-Driven Decision-Making Framework for Fleet Management in the Government Sector of Dubai
Published 2024“…My research aims to develop a data-driven decision support framework for fleet management, focusing on leveraging advanced algorithms, including decision trees and random forests, to generate domain-specific AI models. …”
Get full text
-
730
-
731
Dynamic multiple node failure recovery in distributed storage systems
Published 2018“…We present a range of results for our proposed algorithms in several scenarios to assess the effectiveness of the solution approaches that are shown to generate results close to optimal.…”
Get full text
Get full text
Get full text
Get full text
article -
732
Virtualizing and Scheduling FPGA Resources in Cloud Computing Datacenters
Published 2021Get full text
doctoralThesis -
733
Hybridizing rule-based power system stabilizers with geneticalgorithms
Published 1999“…The proposed approach uses genetic algorithms (GA) to search for optimal settings of rule-based power system stabilizer (RBPSS) parameters. …”
Get full text
Get full text
article -
734
SemIndex: Semantic-Aware Inverted Index
Published 2017“…Preliminary results have demonstrated the effectiveness, scalability and optimality of our approach.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
735
Artificial intelligence models for predicting the mode of delivery in maternal care
Published 2025“…Five machine learning algorithms were evaluated: XGBoost, AdaBoost, random forest, decision tree, and multi-layer perceptron (MLP) classifier. …”
-
736
A Systematic Literature Review on Phishing Email Detection Using Natural Language Processing Techniques
Published 2022“…The findings include that the main research area in phishing detection studies is feature extraction and selection, followed by methods for classifying and optimizing the detection of phishing emails. Amongst the range of classification algorithms, support vector machines (SVMs) are heavily utilised for detecting phishing emails. …”
Get full text
Get full text
-
737
Predicting Android Malware Using Evolution Networks
Published 2025“…We combine this model with genetic algorithms to optimize its parameters and return the best state transition probabilities, and we predict future malware accordingly. …”
Get full text
Get full text
Get full text
masterThesis -
738
Distinguishing Between Fake and Real Smiles Using EEG Signals and Deep Learning
Published 2020Get full text
doctoralThesis -
739
Enhancement of SAR Speckle Denoising Using the Improved Iterative Filter
Published 2020“…The recent advancement in synthetic aperture radar (SAR) technology has enabled high-resolution imaging capability that calls for efficient speckle filtering algorithms to preprocess radar imagery. Since the introduction of the Lee sigma filter in 1980, the various versions of the minimum mean square error (MMSE) filter were developed, focusing essentially on how to estimate the processed pixels. …”
Get full text
article -
740
Corrosion Monitoring Technologies for Reinforced Concrete Structures: A Review
Published 2023“…Irrespective of the adopted processes for corrosion monitoring, it was concluded that none of these methods represent an optimum solution by itself, where employing a combination of multiple systems is one way of optimizing its results. New technology, algorithms, data processing, and AI are new approaches to improving corrosion monitoring processes. …”
Get full text