Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
event modeling » agent modeling (Expand Search)
element based » event based (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
event modeling » agent modeling (Expand Search)
element based » event based (Expand Search)
-
201
Corona power loss computation in bundled bipolar conductors
Published 2000“…In this paper, a finite element (FE) based algorithm devoted for the computation of the corona current and hence the corona power loss associated with bundled bipolar high voltage direct current (HVDC) conductors is presented. …”
Get full text
Get full text
article -
202
Tracking and repairing damaged healthcare databases using the matrix
Published 2015“…The algorithm is based on data dependency and uses a single matrix. …”
Get full text
Get full text
Get full text
Get full text
article -
203
Information Warfare
Published 2015“…The algorithm is based on data dependency and uses a single matrix that will be later used during recovery.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
204
Scatter search for homology modeling
Published 2016“…The metaheuristic optimizes the initial poor alignments and uses fitness functions. We assess our algorithm on a number of proteins whose structures are present in the Protein Data Bank and which have been used in previous literature. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
205
Evacuation of a highly congested urban city
Published 2017“…The algorithm uses Dijkstras algorithm to find the shortest path(s) and a modified greedy algorithm to assign maximum flows to selected paths given a specific schedule per time interval. …”
Get full text
Get full text
Get full text
conferenceObject -
206
Cost-Benefit Analysis of Genotype-Guided Interruption Days in Warfarin Pre-Procedural Management
Published 2022“…The cost of the algorithm was the cost of the genotyping assay. The model event probability inputs were extracted from major literature clinical trials, and the setting-specifc and cost inputs were locally obtained. …”
Get full text
Get full text
Get full text
article -
207
Modeling and Guidance of an Underactuated Autonomous Underwater Vehicle
Published 2017Get full text
doctoralThesis -
208
A hybrid approach for XML similarity
Published 2007“…In this paper, we integrate IR semantic similarity assessment in an edit distance algorithm, seeking to amend similarity judgments when comparing XML-based documents. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
209
Optimizing ADWIN for Steady Streams
Published 2022“…However, online machine learning comes with many challenges for the different aspects of the learning process, starting from the algorithm design to the evaluation method. One of these challenges is the ability of a learning system to adapt to the change in data distribution, known as concept drift, to maintain the accuracy of the predictions. …”
Get full text
Get full text
Get full text
-
210
Scatter search metaheuristic for homology based protein structure prediction. (c2015)
Published 2015“…The metaheuristic is guided using two fitness functions, GA341 and DOPE. 3D models are generated using the software MODELLER. We assess our algorithm on a total of 11 proteins whose structures are present in the Protein Data Bank (PDB) and which has been used in previous literature. …”
Get full text
Get full text
masterThesis -
211
Cost-Benefit Analysis of Genotype-Guided Interruption Days in Warfarin Pre-Procedural Management
Published 2023“…The cost of the algorithm was the cost of the genotyping assay. The model event probability inputs were extracted from major literature clinical trials, and the setting-specifc and cost inputs were locally obtained. …”
-
212
-
213
Information warfare
Published 2017“…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
Get full text
Get full text
Get full text
Get full text
article -
214
Deep Reinforcement Learning for Resource Constrained HLS Scheduling
Published 2022“…The two main steps in HLS are: operations scheduling and data-path allocation. In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. …”
Get full text
Get full text
Get full text
masterThesis -
215
Enhanced DC Microgrid Protection: a Neural Network and Wavelet Transform Approach
Published 2024Get full text
doctoralThesis -
216
On sensor selection in mobile devices based on energy, application accuracy, and context metrics
Published 2013“…In this paper, we propose a sensor selection procedure which decides what sensors to use according to energy, accuracy, and required context metrics. We present an accuracy-energy based algorithm that reduces energy consumption while conserving the required application accuracy. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
217
A new estimator and approach for estimating the subpopulation parameters
Published 2021“…<p dir="ltr">Based on some theoretical results, we recommend a new algorithm for estimating the total and mean of a subpopulation variable for the case of a known subpopulation size, which is different from the algorithm recommended by most of sampling books. …”
-
218
Microwave brain imaging system to detect brain tumor using metamaterial loaded stacked antenna array
Published 2022“…The antenna is comprised of metamaterial-loaded with three substrate layers, including two air gaps. One 1 × 4 MTM array element is used in the top layer and middle layer, and one 3 × 2 MTM array element is used in the bottom layer. …”
-
219
Efficient Test Compaction for Combinational Circuits Based on Fault Detection Count-Directed Clustering
Published 2006“…Test compaction is an effective technique for reducing test data volume and test application time. In this paper, we present a new static test compaction algorithm based on test vector decomposition and clustering. …”
Get full text
article -
220
A Blockchain Model for Secure Communications in Internet of Vehicles
Published 2021“…In this paper, we present a framework for secure IoV communications by utilizing the High Performance Blockchain Consensus (HPBC) algorithm. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject