Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
fluent modeling » agent modeling (Expand Search), event modeling (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element based » event based (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
fluent modeling » agent modeling (Expand Search), event modeling (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element based » event based (Expand Search)
-
181
Wide area monitoring system operations in modern power grids: A median regression function-based state estimation approach towards cyber attacks
Published 2023“…However, the traffic of digital information and communication is potentially vulnerable to data-injection and cyber attacks. To address this issue, a median regression function (MRF)-based state estimation is presented in this paper. …”
-
182
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
Published 2019“…Therefore, for this paper multiple machine learning algorithms are investigated to predict system failure based on vehicle trips information as well as maintenance management historical data including preventive maintenance and corrective maintenance. …”
Get full text
-
183
Forward simulation of three-dimensional advection-diffusion using a fundamental solution for a linear flow
Published 2022“…We then apply the algorithm to Ekman flows in two and three dimensions and compare our results in two dimensions to the grid based, finite element solver COMSOL Multiphysics. …”
Get full text
Get full text
Get full text
masterThesis -
184
Graph contraction for physical optimization methods
Published 1993“…The mapping solution for the original problem is obtained by a straight-forward interpolation. We then present experimental results on using contracted graphs as inputs to two physical optimization methods; namely, Genetic Algorithm and Simulated Annealing. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
185
Inception voltage of corona in bipolar ionized fields-effect oncorona power loss
Published 1996“…In this paper, an iterative finite element based algorithm is presented as a numerical tool for the solution of the bipolar ionized field around high voltage direct current (HVDC) transmission lines. …”
Get full text
Get full text
article -
186
Recursive Parameter Identification Of A Class Of Nonlinear Systems From Noisy Measurements
Published 2020“…The model structure is made up of two linear dynamic elements separated by a nonlinear static one. The nonlinear element is assumed to be of the polynomial type with known order; The identification is based on input/output data where the output is contaminated with measurement noise. …”
Get full text
article -
187
Corona power loss computation in bundled bipolar conductors
Published 2000“…In this paper, a finite element (FE) based algorithm devoted for the computation of the corona current and hence the corona power loss associated with bundled bipolar high voltage direct current (HVDC) conductors is presented. …”
Get full text
Get full text
article -
188
Tracking and repairing damaged healthcare databases using the matrix
Published 2015“…The algorithm is based on data dependency and uses a single matrix. …”
Get full text
Get full text
Get full text
Get full text
article -
189
Information Warfare
Published 2015“…The algorithm is based on data dependency and uses a single matrix that will be later used during recovery.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
190
Scatter search for homology modeling
Published 2016“…The metaheuristic optimizes the initial poor alignments and uses fitness functions. We assess our algorithm on a number of proteins whose structures are present in the Protein Data Bank and which have been used in previous literature. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
191
Evacuation of a highly congested urban city
Published 2017“…The algorithm uses Dijkstras algorithm to find the shortest path(s) and a modified greedy algorithm to assign maximum flows to selected paths given a specific schedule per time interval. …”
Get full text
Get full text
Get full text
conferenceObject -
192
Modeling and Guidance of an Underactuated Autonomous Underwater Vehicle
Published 2017Get full text
doctoralThesis -
193
A hybrid approach for XML similarity
Published 2007“…In this paper, we integrate IR semantic similarity assessment in an edit distance algorithm, seeking to amend similarity judgments when comparing XML-based documents. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
194
Optimizing ADWIN for Steady Streams
Published 2022“…However, online machine learning comes with many challenges for the different aspects of the learning process, starting from the algorithm design to the evaluation method. One of these challenges is the ability of a learning system to adapt to the change in data distribution, known as concept drift, to maintain the accuracy of the predictions. …”
Get full text
Get full text
Get full text
-
195
Scatter search metaheuristic for homology based protein structure prediction. (c2015)
Published 2015“…The metaheuristic is guided using two fitness functions, GA341 and DOPE. 3D models are generated using the software MODELLER. We assess our algorithm on a total of 11 proteins whose structures are present in the Protein Data Bank (PDB) and which has been used in previous literature. …”
Get full text
Get full text
masterThesis -
196
-
197
Information warfare
Published 2017“…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
Get full text
Get full text
Get full text
Get full text
article -
198
Deep Reinforcement Learning for Resource Constrained HLS Scheduling
Published 2022“…The two main steps in HLS are: operations scheduling and data-path allocation. In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. …”
Get full text
Get full text
Get full text
masterThesis -
199
On sensor selection in mobile devices based on energy, application accuracy, and context metrics
Published 2013“…In this paper, we propose a sensor selection procedure which decides what sensors to use according to energy, accuracy, and required context metrics. We present an accuracy-energy based algorithm that reduces energy consumption while conserving the required application accuracy. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
200
A new estimator and approach for estimating the subpopulation parameters
Published 2021“…<p dir="ltr">Based on some theoretical results, we recommend a new algorithm for estimating the total and mean of a subpopulation variable for the case of a known subpopulation size, which is different from the algorithm recommended by most of sampling books. …”