Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
new algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search)
elements new » elements _ (Expand Search), elementi per (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
new algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search)
elements new » elements _ (Expand Search), elementi per (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
-
41
On the complexity of multi-parameterized cluster editing
Published 2017“…As a byproduct, we obtain a kernelization algorithm that delivers linear-size kernels when the two edge-edit bounds are small constants.…”
Get full text
Get full text
Get full text
Get full text
article -
42
Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort
Published 2023“…However, these BEMSs often suffer from a critical limitation—they are primarily trained on building energy data alone, disregarding crucial elements such as occupant comfort and preferences. …”
-
43
Oversampling techniques for imbalanced data in regression
Published 2024“…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …”
-
44
Blockchain-Based Decentralized Architecture for Software Version Control
Published 2023“…The proof of authority (PoA) consensus algorithm will be used to approve the developer communicating modifications to the private blockchain network; the authority will only provide permission and will not be able to add, edit, or delete code files. …”
-
45
An exact and general model order reduction technique for the finite element solution of elastohydrodynamic lubrication problems
Published 2017“…The technique is complemented with a splitting algorithm to alleviate the hurdle of solving an arising semidense matrix system. …”
Get full text
Get full text
Get full text
Get full text
article -
46
Assessment of static pile design methods and non-linear analysis of pile driving
Published 2006“…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …”
Get full text
Get full text
Get full text
masterThesis -
47
-
48
Small-Signal Stability Analysis and Parameters Optimization of Virtual Synchronous Generator for Low-Inertia Power System
Published 2025“…This paper presents a comprehensive small-signal modeling and stability analysis framework for grid-connected virtual synchronous generators (VSGs), integrating: an LCL-filter interfaced power converter, active/reactive power loop (APL/RPL) controllers, and dual-loop PI-based current and voltage control. Through systematic eigenvalue analysis and parameter sensitivity studies, complemented by time-domain verification in MATLAB/SIMULINK, we demonstrate the decisive influence of VSG control parameters on low-frequency oscillation (LFO) damping characteristics, transient frequency stability metrics, including the rate of change of frequency (ROCOF), maximum frequency deviation (<i>fnadir</i>), overshoot, and settling time. …”
-
49
UML-based regression testing for OO software
Published 2010“…For the second phase, we present algorithms for detecting system level changes in the interaction overview diagram. …”
Get full text
Get full text
Get full text
article -
50
Assessment of Inventory and Transportation Collaboration in a Logistics Marketplace
Published 2020Get full text
doctoralThesis -
51
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
Published 2024“…Researchers are also developing various techniques for detecting and analyzing <u>mobile malware</u> to overcome these issues. As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. …”
-
52
Dynamic multiple node failure recovery in distributed storage systems
Published 2018“…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …”
Get full text
Get full text
Get full text
Get full text
article -
53
Modeling and Control of a Thermally Driven MEMS Actuator for RF Applications
Published 2017Get full text
doctoralThesis -
54
Machine Learning Techniques for Pharmaceutical Bioinformatics
Published 2018“…The study integrates knowledge visualization, analysis, as well as development of a predictive model based on the Drug-Drug Interactions (DDIs) as a complex network. …”
Get full text
-
55
Detecting and Predicting Archaeological Sites Using Remote Sensing and Machine Learning—Application to the Saruq Al-Hadid Site, Dubai, UAE
Published 2023“…The modelling and prediction accuracies are expected to improve with the insertion of a neural network and backpropagation algorithms based on the performed cluster groups following more recent field surveys. …”
Get full text
-
56
Detecting and Predicting Archaeological Sites Using Remote Sensing and Machine Learning—Application to the Saruq Al-Hadid Site, Dubai, UAE
Published 2023“…The modelling and prediction accuracies are expected to improve with the insertion of a neural network and backpropagation algorithms based on the performed cluster groups following more recent field surveys. …”
Get full text
article -
57
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
Published 2017“…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …”
Get full text
Get full text
Get full text
article -
58
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
Published 2017“…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …”
Get full text
Get full text
Get full text
article