Search alternatives:
custom algorithm » control algorithm (Expand Search), auction algorithm (Expand Search), cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
level using » level fusion (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
custom algorithm » control algorithm (Expand Search), auction algorithm (Expand Search), cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
level using » level fusion (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
-
61
New Fast Arctangent Approximation Algorithm for Generic Real-Time Embedded Applications
Published 2019“…A new 2nd order rational approximation formula is introduced for the first time in this work and benchmarked against existing alternatives as it improves the new algorithm performance. The eZDSP-F28335 platform has been used for practical implementation and results validation of the proposed technique. …”
-
62
Genetic Algorithm for Solving Site Layout Problem with Unequal-Size and Constrained Facilities
Published 2002“…The paper concludes with examples illustrating the strength and limitations of the proposed algorithm in the cases of ~1! loosely versus tightly constrained layouts with equal levels of interaction between facilities; ~2! …”
Get full text
Get full text
Get full text
article -
63
Optimized FPGA Implementation of PWAM-Based Control of Three—Phase Nine—Level Quasi Impedance Source Inverter
Published 2019“…In this paper, closed loop control of nine - level three - phase qZSI system is implemented using single FPGA control board thereby eliminating above said problems. …”
-
64
-
65
Real-Time Selective Harmonic Mitigation Technique for Power Converters Based on the Exchange Market Algorithm
Published 2020“…<p dir="ltr">Hand-in-hand with the smart-grid paradigm development, power converters used in high-power applications are facing important challenges related to efficiency and power quality. …”
-
66
A multi-class discriminative motif finding algorithm for autosomal genomic data. (c2015)
Published 2016“…These discriminative motifs can be further studied to understand their role both at the evolutionary and disease levels.…”
Get full text
Get full text
masterThesis -
67
A Parallel Genetic Algorithm for the Geometrically Constrained Site Layout Problem with Unequal-Size Facilities
Published 2010“…Parallel genetic algorithms techniques have been used in a variety of computer engineering and science areas. …”
Get full text
Get full text
Get full text
article -
68
-
69
Integrated economic and environmental models for a multi stage cold supply chain under carbon tax regulation
Published 2017“…The elevated level of public and organizations awareness concerning sustainability has necessitated the adoption of environmentally conscious practices in the management of supply chains. …”
Get full text
article -
70
Sensitivity analysis and genetic algorithm-based shear capacity model for basalt FRC one-way slabs reinforced with BFRP bars
Published 2023“…However, FRP-reinforced concrete (RC) structures exhibit less ductile response compared to steel RC structures. Recently, the use of basalt fiber reinforced concrete (BFRC) reinforced with BFRP bars was investigated to achieve a reasonable level of ductility in BFRC-BFRP one-way slabs. …”
-
71
-
72
Development of an Optimization Scheme for A Fixed-Wing UAV Long Endurance with PEMFC and Battery
Published 2018Get full text
doctoralThesis -
73
-
74
A Framework for Predictive Modeling in Sustainable Projects
Published 2012Get full text
doctoralThesis -
75
Simultaneous stabilisation of power systems using geneticalgorithms
Published 1997“…The paper considers the simultaneous stabilisation of a power system over a wide range of operating conditions via a single power system stabiliser using genetic algorithms. A power system operating at various load levels is treated as a finite set of plants. …”
Get full text
Get full text
article -
76
A Survey of Data Clustering Techniques
Published 2023“…This survey examines seven widely recognized clustering techniques, namely k-means, G-means, DBSCAN, Agglomerative hierarchical clustering, Two-stage density (DBSCAN and k-means) algorithm, Two-levels (DBSCAN and hierarchical) clustering algorithm, and Two-stage MeanShift and K-means clustering algorithm and compares them over a real dataset - The Blockchain dataset, including prominent cryptocurrencies like Binance, Bitcoin, Doge, and Ethereum, under several metrics such as silhouette coefficient, Calinski-Harabasz, Davies-Bouldin Index, time complexity, and entropy.…”
Get full text
Get full text
Get full text
masterThesis -
77
Efficient Seismic Volume Compression using the Lifting Scheme
Published 2000“…A separable 3-D discrete wavelet transform (DWT) using long biorthogonal filters is used. The computation efficiency of the DWT is improved by factoring the wavelet filters using the lifting scheme. …”
Get full text
article -
78
Cyberbullying Detection in Arabic Text using Deep Learning
Published 2023“…Therefore, this study aims to evaluate several versions of Recurrent Neural Networks (RNNs) and Feedforward Neural Networks (FNNs) for detecting cyberbullying in the Arabic language. Although these algorithms are widely used in text classification and outperform the performance of classical classifiers, many have been extensively investigated in other domains such as sentiment analysis and dialect identification, as well as cyberbullying detection in English text. …”
Get full text
-
79
A method for data path synthesis using neural networks
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
80