Showing 81 - 93 results of 93 for search '(((( complex class algorithm ) OR ( elements ii algorithm ))) OR ( level coding algorithm ))', query time: 0.10s Refine Results
  1. 81

    A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security by S. Shitharth (12017480)

    Published 2023
    “…Moreover, the Reconciliate Multi-Agent Markov Learning (RMML) based classification algorithm is used to predict the intrusion with its appropriate classes. …”
  2. 82
  3. 83

    Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort by Sergio Márquez-Sánchez (19437985)

    Published 2023
    “…However, these BEMSs often suffer from a critical limitation—they are primarily trained on building energy data alone, disregarding crucial elements such as occupant comfort and preferences. …”
  4. 84

    On the complexity of multi-parameterized cluster editing by Abu-Khzam, Faisal

    Published 2017
    “…As a byproduct, we obtain a kernelization algorithm that delivers linear-size kernels when the two edge-edit bounds are small constants.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 85

    Vibration suppression in a cantilever beam using a string-type vibration absorber by Issa, Jimmy S.

    Published 2017
    “…The design of the vibration absorber is done in two steps. In the first, the spring stiffness, the position of the second attachment point of the string and a preliminary damping constant are calculated using a genetic algorithm approach where the objective function is the maximum displacement on the beam. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  6. 86
  7. 87
  8. 88

    Dynamic multiple node failure recovery in distributed storage systems by Itani, May

    Published 2018
    “…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  9. 89

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates by Ratiba F. Ghachi (14152455)

    Published 2022
    “…<h2>Purpose</h2> <p>We present an approach that combines finite element analysis and genetic algorithms to find the optimal configuration of local resonators created in the host structure to suppress their vibration in a target low-frequency range. …”
  10. 90

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling by Armin, Amindari

    Published 2017
    “…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …”
    Get full text
    Get full text
    Get full text
    article
  11. 91

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling by Amindari, Armin

    Published 2017
    “…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …”
    Get full text
    Get full text
    Get full text
    article
  12. 92
  13. 93

    Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey by Faria Nawshin (21841598)

    Published 2024
    “…As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. There are many machine-learning and deep-learning algorithms have been developed by researchers. …”