Search alternatives:
algorithm cost » algorithm goa (Expand Search), algorithm aoa (Expand Search), algorithm its (Expand Search)
algorithms a » algorithms _ (Expand Search), algorithm _ (Expand Search)
algorithm fa » algorithm _ (Expand Search), algorithms _ (Expand Search)
a function » _ functional (Expand Search)
algorithm cost » algorithm goa (Expand Search), algorithm aoa (Expand Search), algorithm its (Expand Search)
algorithms a » algorithms _ (Expand Search), algorithm _ (Expand Search)
algorithm fa » algorithm _ (Expand Search), algorithms _ (Expand Search)
a function » _ functional (Expand Search)
-
241
Simultaneous stabilisation of power systems using geneticalgorithms
Published 1997“…The problem of selecting the parameters of a power system stabiliser which simultaneously stabilises this set of plants is converted to a simple optimisation problem which is solved by a genetic algorithm and an eigenvalue-based objective function. …”
Get full text
Get full text
article -
242
Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates
Published 2022“…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. Two case studies are considered, and the fitness function used in the optimization problem is the plate’s root mean square of vibration in a specific low-frequency range. …”
-
243
Traffic Offloading with Channel Allocation in Cache-Enabled Ultra-Dense Wireless Networks
Published 2018“…We generate results as a function of a wide range of system parameters, and demonstrate that the proposed algorithms achieve near-optimal performance with notably low time complexity.…”
Get full text
Get full text
Get full text
Get full text
article -
244
UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices
Published 2019“…We demonstrate the favourable characteristics of the proposed algorithms via extensive simulation results and analysis as a function of various system parameters, with benchmarking against two greedy algorithms based on distance and deadline metrics.…”
Get full text
Get full text
Get full text
Get full text
article -
245
Parameter Identification of Flexible Drive Systems using Particle Swarm Optimization
Published 2023Get full text
doctoralThesis -
246
Distinguishing Between Fake and Real Smiles Using EEG Signals and Deep Learning
Published 2020Get full text
doctoralThesis -
247
New primitives to AOP weaving capabilities for security hardening concerns
Published 2007“…These primitives are called exportParameter and importParameter and are used to pass parameters between two point cuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
248
Integrated Energy Optimization and Stability Control Using Deep Reinforcement Learning for an All-Wheel-Drive Electric Vehicle
Published 2025“…., linear quadratic regulator with the sequential quadratic programming (LSQP) and sliding mode control with SQP (SSQP). A tailored multi-term reward function is structured to penalize excessive yaw rate error, sideslip angle, tire slip deviations beyond peak grip regions, and power losses based on a realistic electric machine efficiency map. …”
-
249
The maximum common subgraph problem
Published 2017“…The result is an algorithm whose run time is bounded by a function exponential in the order of the smaller cover rather than in the order of the smaller graph.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
250
New aspect-oriented constructs for security hardening concerns
Published 2009“…The two proposed primitives are called ExportParameter and ImportParameter and are used to pass parameters between two pointcuts. They allow to analyze a program's call graph in order to determine how to change function signatures for passing the parameters associated with a given security hardening. …”
Get full text
Get full text
Get full text
article -
251
Axes-Based Encryption Key
Published 2018“…This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
252
Blood-Based Proteomic Profiling Identifies Potential Biomarker Candidates and Pathogenic Pathways in Dementia
Published 2023“…We used a high-throughput proximity extension immunoassay to quantify 1090 proteins in 122 participants (22 with dementia, 64 with mild cognitive impairment (MCI), and 36 controls with normal cognitive function). …”
-
253
Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité
Published 2009“…The two proposed primitives are called exportParameter and importParameter and are used to pass parameters between two pointcuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
Get full text
Get full text
Get full text
article -
254
Joint distributed synchronization and positioning in UWB ad hoc networks using TOA
Published 2006“…Finally, the proposed distributed maximum log-likelihood algorithm proves to preserve a reasonable level of complexity in each node by approximating asynchronously the positive gradient direction of the log-likelihood function. …”
Get full text
Get full text
Get full text
article -
255
An Introduction to the Special Issue “Protein Glycation in Food, Nutrition, Health and Disease”
Published 2022“…The keynote speaker was Lasker Laureate Professor Kazutoshi Mori, speaking on the unfolded protein response, and there were sessions on: glycation in obesity, diabetes, and diabetic complications; glycation in food; glycation through the life course—from maternal bonding to aging; glycation in plants—physiology, function, and food security; glycation in the COVID-19 response; glycation analytics and chemistry; glycation in kidney disease, cancer, and mental health; glycation-related imaging, diagnostic algorithms, and therapeutics; and methods and models in glycation research. …”
-
256
Artificial intelligence in respiratory care
Published 2024“…Despite barriers, the current decade is witnessing an increased utility of AI into diverse specialities of the medical field to enhance precision medicine, predict diagnosis, therapeutic results, and prognosis; this includes respiratory medicine, critical care, and in their allied specialties. AI algorithms are widely studied in areas like mechanical ventilation, sleep medicine, lung ultrasound, and pulmonary function diagnostics and the results are found to be promising. …”
-
257
Multi-Modal Emotion Aware System Based on Fusion of Speech and Brain Information
Published 2019“…For classifying unimodal data of either speech or EEG, a hybrid fuzzy c-means-genetic algorithm-neural network model is proposed, where its fitness function finds the optimal fuzzy cluster number reducing the classification error. …”
Get full text
Get full text
-
258
Enhanced Inverse Model Predictive Control for EV Chargers: Solution for Rectifier-Side
Published 2024“…Unlike MPC, IMPC offers a significantly reduced computational burden by omitting the iterative computations of the cost functions and states predictions. …”
-
259
LNCRI: Long Non-Coding RNA Identifier in Multiple Species
Published 2021“…But the identification of lncRNAs is an important task to discover their functional role in species. The rapid development of next-generation sequencing technology leveraged the opportunity to discover many lncRNA transcripts. …”
-
260
Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model
Published 2024“…<p>This work aims to provide an effective hybrid beam forming method with Dual-Deep-Network to overcome overhead for mm-wave massive MIMO systems. In this paper, a Dual-Deep-Network technique is described for the extraction of statistical structures from a hybrid beam forming model based on mmWave logics, as well as training logic for the network map functions. …”