Search alternatives:
algorithm its » algorithm _ (Expand Search), algorithm fa (Expand Search), algorithm goa (Expand Search)
its function » cost function (Expand Search)
algorithm a » algorithm fa (Expand Search), algorithms a (Expand Search), algorithm _ (Expand Search)
a function » _ functional (Expand Search)
algorithm its » algorithm _ (Expand Search), algorithm fa (Expand Search), algorithm goa (Expand Search)
its function » cost function (Expand Search)
algorithm a » algorithm fa (Expand Search), algorithms a (Expand Search), algorithm _ (Expand Search)
a function » _ functional (Expand Search)
-
221
Joint distributed synchronization and positioning in UWB ad hoc networks using TOA
Published 2006“…Finally, the proposed distributed maximum log-likelihood algorithm proves to preserve a reasonable level of complexity in each node by approximating asynchronously the positive gradient direction of the log-likelihood function. …”
Get full text
Get full text
Get full text
article -
222
Autonomous Robot Navigation Based On Recurrent Neural Networks
Published 2012Get full text
doctoralThesis -
223
Weak-coupling, strong-coupling and large-order parametrization of the hypergeometric-Meijer approximants
Published 2020“…The first resummation result of the seven-loop series representing the fractal dimension of the two-dimensional self-avoiding polymer is presented here where we get a very accurate value of d<sub>f</sub>=1.3307 compared to its exact value (4/3≈1.3333).…”
-
224
The Use of Enumerative Techniques in Topological Optimization of Computer Networks Subject to Fault Tolerance and Reliability
Published 2003“…Fault tolerance is an important network design aspect. A fault tolerant network is able to function even in the presence of some faults in the network. …”
Get full text
article -
225
The maximum common subgraph problem
Published 2017“…The result is an algorithm whose run time is bounded by a function exponential in the order of the smaller cover rather than in the order of the smaller graph.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
226
On-demand deployment of multiple aerial base stations for traffic offloading and network recovery
Published 2019“…We present performance results for the proposed algorithm as a function of various system parameters and demonstrate its effectiveness compared to the close-to-optimal greedy approach and its superiority compared to recent related work from the literature.…”
Get full text
Get full text
Get full text
Get full text
article -
227
Optimized provisioning of edge computing resources with heterogeneous workload in IoT networks
Published 2019“…We analyze the effectiveness of the proposed algorithm through extensive simulations and highlight valuable performance trends and trade-offs as a function of various system parameters.…”
Get full text
Get full text
Get full text
Get full text
article -
228
Multi-Modal Emotion Aware System Based on Fusion of Speech and Brain Information
Published 2019“…For classifying unimodal data of either speech or EEG, a hybrid fuzzy c-means-genetic algorithm-neural network model is proposed, where its fitness function finds the optimal fuzzy cluster number reducing the classification error. …”
Get full text
Get full text
-
229
Label dependency modeling in Multi-Label Naïve Bayes through input space expansion
Published 2024“…The performance of our approach is gauged against the traditional multi-label Naïve Bayes (MLNB) algorithm and is quantified through a suite of evaluation metrics. …”
-
230
Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers
Published 2023“…The OSF detection and localization algorithm is implemented based on the dynamic response difference between the physical system and its DT. …”
-
231
Improving the Resilience of Smart Distribution Networks against Cyber Attacks
Published 2022Get full text
doctoralThesis -
232
Regression testing web services-based applications
Published 2006“…Our algorithm selects every test sequence that corresponds to a different behavior in the modified system. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
233
Particle swarm optimization approach for protein structure prediction in the 3D HP model
Published 2012“…Proteins fold, under the influence of several chemical and physical factors, into their 3D structures, which determine their biological functions and properties. Misfolding occurs when the protein folds into a 3D structure that does not represent its native structure, which can lead to diseases. …”
Get full text
Get full text
Get full text
article -
234
Data-driven robust model predictive control for greenhouse temperature control and energy utilisation assessment
Published 2023“…A robust model predictive control strategy, based on the minimax objective function and particle swarm optimisation algorithm, is developed to handle the uncertainties in the system. …”
-
235
Design and performance analysis of hybrid MPPT controllers for fuel cell fed DC-DC converter systems
Published 2023“…The studied MPPT controllers are Adaptive Adjustable Step-based Perturb and Observe (AASP&O) controllers, Variable Step Value-Radial Basis Function Controller (VSV-RBFC), Adaptive Step Hill Climb (ASHC) based fuzzy technique, Variable P&O with Particle Swarm Optimization (VP&O-PSO), and Variable Step Grey Wolf Algorithm (VSGWA) based fuzzy logic controller. …”
-
236
Design and performance analysis of hybrid MPPT controllers for fuel cell fed DC-DC converter systems
Published 2023“…The studied MPPT controllers are Adaptive Adjustable Step-based Perturb and Observe (AAS-P&O) controllers, Variable Step Value-Radial Basis Function Controller (VSV-RBFC), Adaptive Step Hill Climb (ASHC) based fuzzy technique, Variable P&O with Particle Swarm Optimization (VP&O-PSO), and Variable Step Grey Wolf Algorithm (VSGWA) based fuzzy logic controller. …”
Get full text
Get full text
Get full text
article -
237
Fixed set search applied to the multi-objective minimum weighted vertex cover problem
Published 2022“…One important characteristic of the proposed GRASP is that it avoids the use of weighted sums of objective functions in the local search and the greedy algorithm. …”
-
238
R-CONV++: uncovering privacy vulnerabilities through analytical gradient inversion attacks
Published 2025“…The first algorithm presents a novel data leakage method that efficiently exploits convolutional layer gradients, demonstrating that even with non-fully invertible activation functions, such as ReLU, training samples can be analytically reconstructed directly from gradients without the need to reconstruct intermediate layer outputs. …”
-
239
Modeling of magnetization curves for computer-aided design
Published 1993“…A simple algorithm is presented for obtaining the coefficients of the sine-series function for modelling the magnetization curves of magnetic materials. …”
Get full text
Get full text
article -
240
Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem
Published 2016“…The research note is presented in two parts: Part A presents an overview of REBUS, including its development, algorithm, and its primary functions. …”
Get full text
Get full text
Get full text
Get full text
article