The proliferation of recommendation systems has revolutionized information retrieval by helping users efficiently navigate through large data sets. However, these systems often suffer from information bias, especially...
详细信息
Artificial Intelligence (AI) has also started to be regularly introduced in cloud-based systems as it can help improve performance and skyrocket efficiency. It is a challenge for such systems to schedule tasks in real...
详细信息
This work introduces a novel method for optimizing PID (proportional-integral-derivative) controllers in Maglev systems using two well-known optimization algorithms: Grey Wolf Optimization (GWO) and Genetic Algorithm ...
详细信息
The importance of Wireless Power Transfer (WPT) technology in biomedical implants to mitigate the risk of regeneration has increased significantly in recent years. WPT systems are dependent on key parameters such as t...
详细信息
Summary: Evolutionary algorithms (EAs) are a form of optimization algorithms that use requirements from herbal choice and evolution to expand systems that could adapt and discover better. They are usually utilized in ...
详细信息
With the continuous development of society, the risk assessment of unexpected events in universities has become increasingly important. This study aims to explore the application of graph theory algorithms in complex ...
详细信息
In the dynamic landscape of the Internet of Things (IoT), the demand for efficient lightweight cryptographic (LWC) algorithms transcends traditional security considerations. This research addresses the compelling need...
详细信息
This paper presents a study on the optimization of You Only Look Once (YOLO) object detection algorithms for enhancing autonomous vehicle (AV) perception systems, with a focus on the United Arab Emirates (UAE) driving...
详细信息
This paper presents an innovative way of image compression using Field-Programmable Gate Array (FPGA) implementation of the Integer Wavelet Transform (IWT) and Discrete Wavelet Transform (DWT) algorithms. For situatio...
详细信息
In this paper, Rossler’s attractor and the circular shifting method are used to create a hardware-based encryption scheme that can be changed to protect speech communication. In order to ratify the limitations of sof...
详细信息
暂无评论