-
261
Design and performance analysis of hybrid MPPT controllers for fuel cell fed DC-DC converter systems
Published 2023“…The studied MPPT controllers are Adaptive Adjustable Step-based Perturb and Observe (AAS-P&O) controllers, Variable Step Value-Radial Basis Function Controller (VSV-RBFC), Adaptive Step Hill Climb (ASHC) based fuzzy technique, Variable P&O with Particle Swarm Optimization (VP&O-PSO), and Variable Step Grey Wolf Algorithm (VSGWA) based fuzzy logic controller. …”
Get full text
Get full text
Get full text
article -
262
Design and performance analysis of hybrid MPPT controllers for fuel cell fed DC-DC converter systems
Published 2023“…The studied MPPT controllers are Adaptive Adjustable Step-based Perturb and Observe (AASP&O) controllers, Variable Step Value-Radial Basis Function Controller (VSV-RBFC), Adaptive Step Hill Climb (ASHC) based fuzzy technique, Variable P&O with Particle Swarm Optimization (VP&O-PSO), and Variable Step Grey Wolf Algorithm (VSGWA) based fuzzy logic controller. …”
-
263
Data-driven robust model predictive control for greenhouse temperature control and energy utilisation assessment
Published 2023“…A robust model predictive control strategy, based on the minimax objective function and particle swarm optimisation algorithm, is developed to handle the uncertainties in the system. …”
-
264
Real-Time Implementation of GPS Aided Low Cost Strapdown Inertial Navigation System
Published 2009Get full text
doctoralThesis -
265
Decision-level fusion for single-view gait recognition with various carrying and clothing conditions
Published 2017“…Gait samples are fed into the MPCA and MPCALDA algorithms using a novel tensor-based form of the gait images. …”
Get full text
article -
266
Decision-level Gait Fusion for Human Identification at a Distance
Published 2014Get full text
doctoralThesis -
267
AGEomics Biomarkers and Machine Learning—Realizing the Potential of Protein Glycation in Clinical Diagnostics
Published 2022“…AGEomics biomarkers have been used in diagnostic algorithms using machine learning methods. …”
-
268
FoGMatch
Published 2019“…To address this problem, we propose in this paper a multi-criteria intelligent IoT scheduling approach in fog computing environments using matching game theory. Our solution consists of (1) two optimization problems, one for the IoT devices and one for the fog nodes, (2) preference functions for both the IoT and fog layers to help them rank each other on the basis of several criteria such latency and resource utilization, and (3) centralized and distributed intelligent scheduling algorithms that consider the preferences of both the fog and IoT layers to improve the performance of the overall IoT ecosystem. …”
Get full text
Get full text
Get full text
masterThesis -
269
Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates
Published 2022“…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …”
-
270
Condenser capacity and hyperbolic perimeterImage 1
Published 2021“…We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
Get full text
Get full text
Get full text
article -
271
Software defect prediction. (c2019)
Published 2019“…One that focuses on predicting defect in software modules using a hybrid heuristic - a combination of Particle Swarm Optimization (PSO) and Genetic Algorithms (GA). …”
Get full text
Get full text
Get full text
masterThesis -
272
New primitives to AOP weaving capabilities for security hardening concerns
Published 2007“…We find this feature necessary in order to implement security hardening solutions that are infeasible or impractical using the current AOP proposals. Moreover, we show the viability and correctness of our proposed primitives by elaborating their algorithms and presenting experimental results.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
273
Condenser capacity and hyperbolic perimeter
Published 2022“…<p dir="ltr">We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
-
274
H.264/AVC to HEVC Video Transcoder Based on Dynamic Thresholding and Content Modeling
Published 2014“…Then, two types of mode mapping algorithms are proposed. In the first solution, a single H.264/AVC coding parameter is used to determine the outgoing HEVC partitions using dynamic thresholding. …”
Get full text
article -
275
Axes-Based Encryption Key
Published 2018“…This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. The approach is based on concepts: transforming data, distributing data, and XORing it with other data. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
276
A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications
Published 2011“…We evaluate and optimize the performance of the proposed adaptive compression scheme using experimental measurements in different scenarios and as a function of various parameters. …”
Get full text
Get full text
Get full text
article -
277
Scalable Multimedia Streaming in Wireless Networks with Device-to-Device Cooperation
Published 2016“…We demonstrate the functionality of the proposed system on Android devices using heterogeneous networks (cellular/WiFi/WiFi-Direct) and show the formation of multiple clusters to allow for scalable operation. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
278
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…Dedicated weighting functions and various search algorithms have been developed for that purpose and will be presented here. …”
Get full text
Get full text
Get full text
Get full text
article -
279
Common weaving approach in mainstream languages for software security hardening
Published 2013“…GIMPLE weaving accompanied by a common aspect-oriented language (1) allows security experts providing security solutions using this common language, (2) lets developers focus on the main functionality of programs by relieving them from the burden of security issues, (3) unifies the matching and the weaving processes for mainstream languages, and (4) facilitates introducing new security features in AOP languages. …”
Get full text
Get full text
Get full text
article -
280
Integration of nonparametric fuzzy classification with an evolutionary-developmental framework to perform music sentiment-based analysis and composition
Published 2019“…Unlike existing solutions, MUSEC is: (i) a hybrid crossover between supervised learning (SL, to learn sentiments from music) and evolutionary computation (for music composition, MC), where SL serves at the fitness function of MC to compose music that expresses target sentiments, (ii) extensible in the panel of emotions it can convey, producing pieces that reflect a target crisp sentiment (e.g., love) or a collection of fuzzy sentiments (e.g., 65% happy, 20% sad, and 15% angry), compared with crisp-only or two-dimensional (valence/arousal) sentiment models used in existing solutions, (iii) adopts the evolutionary-developmental model, using an extensive set of specially designed music-theoretic mutation operators (trille, staccato, repeat, compress, etc.), stochastically orchestrated to add atomic (individual chord-level) and thematic (chord pattern-level) variability to the composed polyphonic pieces, compared with traditional evolutionary solutions producing monophonic and non-thematic music. …”
Get full text
Get full text
Get full text
Get full text
article