Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
update » updated (Expand Search)
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
update » updated (Expand Search)
-
381
Energy-Aware QoS Uplink Scheduling for UGS Traffic Flows in WiMAX Networks
Published 2014“…We used Voice-over-IP (VoIP) traffic connection models for UGS traffic flows to simulate and validate algorithm. …”
Get full text
article -
382
-
383
-
384
A Multistage Passive Islanding Detection Method for Synchronous-Based Distributed Generation
Published 2021“…In this article, the proposed classifier is trained and tested using a database of feature vectors, obtained using PSCAD, which were designed to reflect a variety of commonly encountered events on an IEEE 34-bus distribution system. …”
Get full text
article -
385
ENUMERATIVE TECHNIQUES IN TOPOLOGICAL OPTIMIZATION OF COMPUTER NETWORKS SUBJECT TO FAULT TOLERANCE AND RELIABILITY
Published 2002“…Experimental results obtained from a set of randomly generated networks using the proposed algorithms are presented and compared to those obtained using the existing techniques [1], [2]. …”
Get full text
article -
386
Guidance, Control and Trajectory Tracking of Small Fixed Wing Unmanned Aerial Vehicles (UAV's)
Published 2009Get full text
doctoralThesis -
387
Tabu Search For A Class Of Single-Machine Scheduling Problems
Published 2020“…Problems from the literature are used to test the performance of the algorithm. This algorithm can be used for solving other problems such as minimizing completion time deviation from a common due date.…”
Get full text
article -
388
-
389
A novel hybrid methodology for fault diagnosis of wind energy conversion systems
Published 2023“…Feature selection pre-processing is an important step to increase the accuracy of the classification algorithm and decrease the dimensionality of a dataset. …”
-
390
Logic-based Benders decomposition combined with column generation for mobile 3D printer scheduling problem
Published 2025“…After analyzing the characteristics and structure of the model, a logic-based Benders decomposition algorithm framework is designed for solving this problem. …”
-
391
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
Get full text
Get full text
Get full text
article -
392
Vehicular-OBUs-As-On-Demand-Fogs
Published 2020“…For instance, real-time vehicular applications require fast processing of the vast amount of generated data by vehicles in order to maintain service availability and reachability while driving. …”
Get full text
Get full text
Get full text
Get full text
article -
393
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
-
394
-
395
Information warfare. (c2015)
Published 2015“…Numerous damage assessment and recovery algorithms have been proposed by researchers. In this work we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
Get full text
Get full text
masterThesis -
396
A Novel Internal Model Control Scheme for Adaptive Tracking of Nonlinear Dynamic Plants
Published 2006“…The use of U-model alleviates the computational complexity of on-line nonlinear controller design that arises when using other modelling frame works such as NARMAX model. …”
Get full text
Get full text
article -
397
Information warfare
Published 2017“…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
Get full text
Get full text
Get full text
Get full text
article -
398
Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials
Published 1997“…However, the improved performance is achieved at the expense of higher computational complexity and data requirements.…”
Get full text
masterThesis -
399
Fast force-directed/simulated evolution hybrid for multiobjective VLSI cell placement
Published 2004“…In this work, a fast hybrid algorithm is designed to address this problem. The algorithm employs simulated evolution (SE), an iterative search heuristic that comprises three steps: evaluation, selection and allocation. …”
Get full text
Get full text
article -
400
Adaptive controlled superconducting magnetic energy storage devices for performance enhancement of wind energy systems
Published 2023“…This research paper introduces the Generalized Continuous Mixed P-Norm Sub-Band Adaptive Filtering (GCMPNSAF) algorithm, designed for efficient online control of Superconducting Magnetic Energy Storage Devices (SMESDs) in Wind Energy Systems (WESs). …”
Get full text
Get full text
Get full text
article