Search alternatives:
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
element » elements (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
element » elements (Expand Search)
-
781
An aspect-oriented framework for systematic security hardening of software
Published 2008“…We realize our proposition by integrating into the GCC compiler few features described in the SHL weaving semantics and developing a demonstrative case study…”
Get full text
Get full text
Get full text
masterThesis -
782
Adaptive false discovery rate for wavelet denoising of pavement continuous deflection measurements
Published 2016“…The denoising methodology comprises a computational algorithm to identify significant features in a high-dimensional vector of observations containing white Gaussian noise. …”
Get full text
Get full text
Get full text
Get full text
article -
783
Uplink Noma in UAV-Assisted IoT Networks
Published 2022“…Given the complexity of the problem and the incomplete knowledge about the environment, the problem is divided into two subproblems: the first models the UAV trajectory and the selection of the first device in the NOMA cluster at each time slot as a Markov Decision Process, and uses Proximal Policy Optimization to solve it. The second device is then selected using a heuristic algorithm based on prioritizing devices with higher bit rate requirements and strict deadlines. …”
Get full text
Get full text
Get full text
masterThesis -
784
Anonymizing multimedia documents
Published 2016“…In this paper, we propose de-linkability, a privacy-preserving constraint to bound the amount of information outsourced that can be used to re-identify individuals. We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …”
Get full text
Get full text
Get full text
Get full text
article -
785
Test time minimization for system-on-chip with test bus assignment and sizin
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
786
Machine Learning-Based Approach for EV Charging Behavior
Published 2021Get full text
doctoralThesis -
787
Optimization of PV Cleaning Practices: Comparison Between Performance-Based and Periodic-Based Approaches
Published 2020“…It is important to choose the right cleaning strategy (method and frequency) to maximize the electricity production and economic performance of the PV facility. An optimization algorithm was developed and tested for multiple PV panel configurations based in Dubai Water and Electricity Authority’s (DEWA) outdoor test facil ity (OTF) solar lab. …”
Get full text
Get full text
-
788
An Infrastructure-Assisted Crowdsensing Approach for On-Demand Traffic Condition Estimation
Published 2019“…However, the current solutions proposed for the use of crowdsensing for the collection of traffic related data adopt an opportunistic continuous sensing approach, which entails high resource consumption on the server and mobile device side, a high communication overhead, while offering little control of the users over the sensing activity. …”
Get full text
Get full text
Get full text
Get full text
article -
789
ARDENT: A Proactive Agent-Based Routing Protocol for Internet of Vehicles
Published 2023“…The design of an efficient routing algorithm for the Internet of Vehicles (IoV) poses several problems due to its special characteristics, including nodes high-speed mobility, frequent topology change, link instability, and the presence of radio obstacles. …”
Get full text
Get full text
Get full text
Get full text
article -
790
Optimal shunt compensators at nonsinusoidal busbars
Published 1995“…A model for determining an optimal shunt capacitor value at nonsinusoidal busbars combining three basic criteria maximizing the power factor, minimizing the line losses, and maximizing the transmission efficiency is developed. …”
Get full text
Get full text
article -
791
An efficient claim management assurance system using EPC contract based on improved monarch butterfly optimization models
Published 2024“…To address these challenges, a claim management system is developed based on the Improved Monarch Butterfly Optimization Algorithm (IMBOA) and the principles of EPC. …”
-
792
Comparative Study of Control Strategies for Under Actuated Manipulator
Published 2006Get full text
doctoralThesis -
793
Deepfakes Signatures Detection in the Handcrafted Features Space
Published 2023“…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
Get full text
-
794
OPTIMAL SHUNT COMPENSATORS AT NON-SINUSOIDAL BUSBARS
Published 2020“…A model for determining an optimal shunt capacitor value at nonsinusoidal busbars combining three basic criteria maximizing the power factor, minimizing the line losses, and maximizing the transmission efficiency is developed. …”
Get full text
article -
795
Estimating Vehicle State by GPS/IMU Fusion with Vehicle Dynamics
Published 2013Get full text
doctoralThesis -
796
-
797
Estimation of power grid topology parameters through pilot signals
Published 2016Get full text
Get full text
Get full text
conferenceObject -
798
Implementation of trust region methods in optimization. (c1998)
Published 1998Get full text
Get full text
masterThesis -
799
Collision-Free Autonomous Navigation Solution for Mobile Wheeled
Published 2023Get full text
doctoralThesis -
800
Economic Production Lot-Sizing For An Unreliable Machine Under Imperfect Age-Based Maintenance Policy
Published 2020“…Some useful properties of the cost function are developed to characterize the optimal policy. An algorithm is also proposed to find the optimal solutions to the problem at hand. …”
Get full text
article