Search alternatives:
heating » creating (Expand Search), treating (Expand Search)
functions » functional (Expand Search)
Showing 261 - 280 results of 295 for search '(( ((algorithm heating) OR (algorithm using)) functions ) OR ( algorithm python function ))*', query time: 0.10s Refine Results
  1. 261
  2. 262
  3. 263

    Enhanced Microgrid Reliability Through Optimal Battery Energy Storage System Type and Sizing by Mohammadreza Gholami (17032317)

    Published 2023
    “…To determine the optimized size, a firefly optimization algorithm is used as an efficient meta-heuristic approach. …”
  4. 264

    Design and performance analysis of hybrid MPPT controllers for fuel cell fed DC-DC converter systems by Shaik, Rafikiran

    Published 2023
    “…The studied MPPT controllers are Adaptive Adjustable Step-based Perturb and Observe (AAS-P&O) controllers, Variable Step Value-Radial Basis Function Controller (VSV-RBFC), Adaptive Step Hill Climb (ASHC) based fuzzy technique, Variable P&O with Particle Swarm Optimization (VP&O-PSO), and Variable Step Grey Wolf Algorithm (VSGWA) based fuzzy logic controller. …”
    Get full text
    Get full text
    Get full text
    article
  5. 265

    Design and performance analysis of hybrid MPPT controllers for fuel cell fed DC-DC converter systems by Shaik Rafikiran (15838929)

    Published 2023
    “…The studied MPPT controllers are Adaptive Adjustable Step-based Perturb and Observe (AASP&O) controllers, Variable Step Value-Radial Basis Function Controller (VSV-RBFC), Adaptive Step Hill Climb (ASHC) based fuzzy technique, Variable P&O with Particle Swarm Optimization (VP&O-PSO), and Variable Step Grey Wolf Algorithm (VSGWA) based fuzzy logic controller. …”
  6. 266

    Data-driven robust model predictive control for greenhouse temperature control and energy utilisation assessment by Farhat Mahmood (15468854)

    Published 2023
    “…A robust model predictive control strategy, based on the minimax objective function and particle swarm optimisation algorithm, is developed to handle the uncertainties in the system. …”
  7. 267
  8. 268

    AGEomics Biomarkers and Machine Learning—Realizing the Potential of Protein Glycation in Clinical Diagnostics by Naila Rabbani (291722)

    Published 2022
    “…AGEomics biomarkers have been used in diagnostic algorithms using machine learning methods. …”
  9. 269

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates by Ratiba F. Ghachi (14152455)

    Published 2022
    “…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …”
  10. 270

    Condenser capacity and hyperbolic perimeterImage 1 by Mohamed M.S., Nasser

    Published 2021
    “…We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
    Get full text
    Get full text
    Get full text
    article
  11. 271

    Software defect prediction. (c2019) by Moussa, Rebecca

    Published 2019
    “…One that focuses on predicting defect in software modules using a hybrid heuristic - a combination of Particle Swarm Optimization (PSO) and Genetic Algorithms (GA). …”
    Get full text
    Get full text
    Get full text
    masterThesis
  12. 272

    New primitives to AOP weaving capabilities for security hardening concerns by Mourad, Azzam

    Published 2007
    “…We find this feature necessary in order to implement security hardening solutions that are infeasible or impractical using the current AOP proposals. Moreover, we show the viability and correctness of our proposed primitives by elaborating their algorithms and presenting experimental results.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 273

    Condenser capacity and hyperbolic perimeter by Mohamed M.S. Nasser (16931772)

    Published 2022
    “…<p dir="ltr">We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
  14. 274

    Axes-Based Encryption Key by Haidar, Imane

    Published 2018
    “…This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. The approach is based on concepts: transforming data, distributing data, and XORing it with other data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 275

    A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications by Sharafeddine, Sanaa

    Published 2011
    “…We evaluate and optimize the performance of the proposed adaptive compression scheme using experimental measurements in different scenarios and as a function of various parameters. …”
    Get full text
    Get full text
    Get full text
    article
  16. 276

    Scalable Multimedia Streaming in Wireless Networks with Device-to-Device Cooperation by Jahed, Karim

    Published 2016
    “…We demonstrate the functionality of the proposed system on Android devices using heterogeneous networks (cellular/WiFi/WiFi-Direct) and show the formation of multiple clusters to allow for scalable operation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  17. 277

    Common weaving approach in mainstream languages for software security hardening by Alhadidi, Dima

    Published 2013
    “…GIMPLE weaving accompanied by a common aspect-oriented language (1) allows security experts providing security solutions using this common language, (2) lets developers focus on the main functionality of programs by relieving them from the burden of security issues, (3) unifies the matching and the weaving processes for mainstream languages, and (4) facilitates introducing new security features in AOP languages. …”
    Get full text
    Get full text
    Get full text
    article
  18. 278

    Integrated whole transcriptome and small RNA analysis revealed multiple regulatory networks in colorectal cancer by Hibah Shaath (5599658)

    Published 2021
    “…Computational analyses using Ingenuity Pathway Analysis (IPA) identified multiple activated signaling networks in CRC, including ERBB2, RABL6, FOXM1, and NFKB networks, while functional annotation highlighted activation of cell proliferation and migration as the hallmark of CRC. …”
  19. 279

    Integration of nonparametric fuzzy classification with an evolutionary-developmental framework to perform music sentiment-based analysis and composition by Abboud, Ralph

    Published 2019
    “…Unlike existing solutions, MUSEC is: (i) a hybrid crossover between supervised learning (SL, to learn sentiments from music) and evolutionary computation (for music composition, MC), where SL serves at the fitness function of MC to compose music that expresses target sentiments, (ii) extensible in the panel of emotions it can convey, producing pieces that reflect a target crisp sentiment (e.g., love) or a collection of fuzzy sentiments (e.g., 65% happy, 20% sad, and 15% angry), compared with crisp-only or two-dimensional (valence/arousal) sentiment models used in existing solutions, (iii) adopts the evolutionary-developmental model, using an extensive set of specially designed music-theoretic mutation operators (trille, staccato, repeat, compress, etc.), stochastically orchestrated to add atomic (individual chord-level) and thematic (chord pattern-level) variability to the composed polyphonic pieces, compared with traditional evolutionary solutions producing monophonic and non-thematic music. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  20. 280

    Large language models for code completion: A systematic literature review by Rasha Ahmad Husein (19744756)

    Published 2024
    “…This is achieved by predicting subsequent tokens, such as keywords, variable names, types, function names, operators, and more. Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …”