Search alternatives:
using function » using fusion (Expand Search)
algorithms a » algorithms _ (Expand Search), algorithm _ (Expand Search)
algorithm fa » algorithm _ (Expand Search), algorithms _ (Expand Search)
a function » _ functional (Expand Search)
using function » using fusion (Expand Search)
algorithms a » algorithms _ (Expand Search), algorithm _ (Expand Search)
algorithm fa » algorithm _ (Expand Search), algorithms _ (Expand Search)
a function » _ functional (Expand Search)
-
281
Software defect prediction. (c2019)
Published 2019“…One that focuses on predicting defect in software modules using a hybrid heuristic - a combination of Particle Swarm Optimization (PSO) and Genetic Algorithms (GA). …”
Get full text
Get full text
Get full text
masterThesis -
282
Anonymizing multimedia documents
Published 2016“…We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …”
Get full text
Get full text
Get full text
Get full text
article -
283
Traffic Offloading with Channel Allocation in Cache-Enabled Ultra-Dense Wireless Networks
Published 2018“…We generate results as a function of a wide range of system parameters, and demonstrate that the proposed algorithms achieve near-optimal performance with notably low time complexity.…”
Get full text
Get full text
Get full text
Get full text
article -
284
New aspect-oriented constructs for security hardening concerns
Published 2009“…The two proposed primitives are called ExportParameter and ImportParameter and are used to pass parameters between two pointcuts. They allow to analyze a program's call graph in order to determine how to change function signatures for passing the parameters associated with a given security hardening. …”
Get full text
Get full text
Get full text
article -
285
Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers
Published 2023“…To develop the DT, a dense deep neural network (DNN) machine learning approach is used. …”
-
286
Oversampling techniques for imbalanced data in regression
Published 2024“…For tabular data we conducted a comprehensive experiment using various models trained on both augmented and non-augmented datasets, followed by performance comparisons on test data. …”
-
287
Improving the Resilience of Smart Distribution Networks against Cyber Attacks
Published 2022Get full text
doctoralThesis -
288
Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité
Published 2009“…The two proposed primitives are called exportParameter and importParameter and are used to pass parameters between two pointcuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
Get full text
Get full text
Get full text
article -
289
Optimized 3D Deployment of UAV-Mounted Cloudlets to Support Latency-Sensitive Services in IoT Networks
Published 2019“…The performance of the meta-heuristic solution is evaluated and compared to the optimal solution as a function of various system parameters and for different application use cases. …”
Get full text
Get full text
Get full text
Get full text
article -
290
Label dependency modeling in Multi-Label Naïve Bayes through input space expansion
Published 2024“…To accommodate the heterogeneity of the expanded input space, we refine the likelihood parameters of iMLNB using a joint density function, which is adept at handling the amalgamation of data types. …”
-
291
On-demand deployment of multiple aerial base stations for traffic offloading and network recovery
Published 2019“…We present performance results for the proposed algorithm as a function of various system parameters and demonstrate its effectiveness compared to the close-to-optimal greedy approach and its superiority compared to recent related work from the literature.…”
Get full text
Get full text
Get full text
Get full text
article -
292
Optimized provisioning of edge computing resources with heterogeneous workload in IoT networks
Published 2019“…We analyze the effectiveness of the proposed algorithm through extensive simulations and highlight valuable performance trends and trade-offs as a function of various system parameters.…”
Get full text
Get full text
Get full text
Get full text
article -
293
Blood Glucose Regulation Modelling and Intelligent Control
Published 2024Get full text
doctoralThesis -
294
Particle swarm optimization approach for protein structure prediction in the 3D HP model
Published 2012“…In this paper, we present a particle swarm optimization (PSO) based algorithm for predicting protein structures in the 3D hydrophobic polar model. …”
Get full text
Get full text
Get full text
article -
295
Blood-Based Proteomic Profiling Identifies Potential Biomarker Candidates and Pathogenic Pathways in Dementia
Published 2023“…We used a high-throughput proximity extension immunoassay to quantify 1090 proteins in 122 participants (22 with dementia, 64 with mild cognitive impairment (MCI), and 36 controls with normal cognitive function). …”
-
296
Guidance, Control and Trajectory Tracking of Small Fixed Wing Unmanned Aerial Vehicles (UAV's)
Published 2009Get full text
doctoralThesis -
297
Enhanced Microgrid Reliability Through Optimal Battery Energy Storage System Type and Sizing
Published 2023“…To determine the optimized size, a firefly optimization algorithm is used as an efficient meta-heuristic approach. …”
-
298
Data-driven robust model predictive control for greenhouse temperature control and energy utilisation assessment
Published 2023“…A robust model predictive control strategy, based on the minimax objective function and particle swarm optimisation algorithm, is developed to handle the uncertainties in the system. …”
-
299
Design and performance analysis of hybrid MPPT controllers for fuel cell fed DC-DC converter systems
Published 2023“…The studied MPPT controllers are Adaptive Adjustable Step-based Perturb and Observe (AASP&O) controllers, Variable Step Value-Radial Basis Function Controller (VSV-RBFC), Adaptive Step Hill Climb (ASHC) based fuzzy technique, Variable P&O with Particle Swarm Optimization (VP&O-PSO), and Variable Step Grey Wolf Algorithm (VSGWA) based fuzzy logic controller. …”
-
300
Design and performance analysis of hybrid MPPT controllers for fuel cell fed DC-DC converter systems
Published 2023“…The studied MPPT controllers are Adaptive Adjustable Step-based Perturb and Observe (AAS-P&O) controllers, Variable Step Value-Radial Basis Function Controller (VSV-RBFC), Adaptive Step Hill Climb (ASHC) based fuzzy technique, Variable P&O with Particle Swarm Optimization (VP&O-PSO), and Variable Step Grey Wolf Algorithm (VSGWA) based fuzzy logic controller. …”
Get full text
Get full text
Get full text
article