Showing 261 - 280 results of 349 for search '(( algorithm machine function ) OR ((( algorithm its function ) OR ( algorithms a function ))))', query time: 0.10s Refine Results
  1. 261
  2. 262

    Data-driven robust model predictive control for greenhouse temperature control and energy utilisation assessment by Farhat Mahmood (15468854)

    Published 2023
    “…A robust model predictive control strategy, based on the minimax objective function and particle swarm optimisation algorithm, is developed to handle the uncertainties in the system. …”
  3. 263

    Design and performance analysis of hybrid MPPT controllers for fuel cell fed DC-DC converter systems by Shaik Rafikiran (15838929)

    Published 2023
    “…The studied MPPT controllers are Adaptive Adjustable Step-based Perturb and Observe (AASP&O) controllers, Variable Step Value-Radial Basis Function Controller (VSV-RBFC), Adaptive Step Hill Climb (ASHC) based fuzzy technique, Variable P&O with Particle Swarm Optimization (VP&O-PSO), and Variable Step Grey Wolf Algorithm (VSGWA) based fuzzy logic controller. …”
  4. 264

    Design and performance analysis of hybrid MPPT controllers for fuel cell fed DC-DC converter systems by Shaik, Rafikiran

    Published 2023
    “…The studied MPPT controllers are Adaptive Adjustable Step-based Perturb and Observe (AAS-P&O) controllers, Variable Step Value-Radial Basis Function Controller (VSV-RBFC), Adaptive Step Hill Climb (ASHC) based fuzzy technique, Variable P&O with Particle Swarm Optimization (VP&O-PSO), and Variable Step Grey Wolf Algorithm (VSGWA) based fuzzy logic controller. …”
    Get full text
    Get full text
    Get full text
    article
  5. 265

    Power system output feedback stabilizer design via geneticalgorithms by Abdel-Magid, Y.L.

    Published 1997
    “…In the second method, the problem of selecting the output feedback gains is converted to a simple optimization problem with an eigenvalue based objective function, which is solved by a genetic algorithm. …”
    Get full text
    Get full text
    article
  6. 266

    FoGMatch by Arisdakessian, Sarhad

    Published 2019
    “…Our solution consists of (1) two optimization problems, one for the IoT devices and one for the fog nodes, (2) preference functions for both the IoT and fog layers to help them rank each other on the basis of several criteria such latency and resource utilization, and (3) centralized and distributed intelligent scheduling algorithms that consider the preferences of both the fog and IoT layers to improve the performance of the overall IoT ecosystem. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  7. 267

    Singularly perturbed nonlinear ODEs and interior point optimizationalgorithms by Ezzine, J.

    Published 1995
    “…In addition, this connection is used to show that the logarithmic barrier function is indeed, in some sense, optimum…”
    Get full text
    Get full text
    article
  8. 268

    Regression testing web services-based applications by Tarhini, Abbas

    Published 2006
    “…Our algorithm selects every test sequence that corresponds to a different behavior in the modified system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 269

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates by Ratiba F. Ghachi (14152455)

    Published 2022
    “…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. Two case studies are considered, and the fitness function used in the optimization problem is the plate’s root mean square of vibration in a specific low-frequency range. …”
  10. 270

    Iterative heuristics for multiobjective VLSI standard cellplacement by Sait, Sadiq M.

    Published 2001
    “…Fuzzy rules are incorporated in order to design a multiobjective cost function that integrates the costs of three objectives in a single overall cost value. …”
    Get full text
    Get full text
    article
  11. 271

    EVOLUTIONARY HEURISTICS FOR MULTIOBJECTIVE VLSI NETLIST BI-PARTITIONING by Sait, Sadiq M.

    Published 2020
    “…Fuzzy rules are incorporated in order to design a multiobjective cost function. Both the techniques are applied to ISCAS-85/89 benchmark circuits and experimental results are reported and compared.…”
    Get full text
    article
  12. 272

    General iterative heuristics for VLSI multiobjective partitioning by Sait, Sadiq M.

    Published 2003
    “…These heuristics are based on Genetic Algorithms (GAs) and Tabu Search (TS) and incorporate fuzzy rules in order to handle the multiobjective cost function. …”
    Get full text
    Get full text
    article
  13. 273

    Traffic Offloading with Channel Allocation in Cache-Enabled Ultra-Dense Wireless Networks by Abbas, Nadine

    Published 2018
    “…We generate results as a function of a wide range of system parameters, and demonstrate that the proposed algorithms achieve near-optimal performance with notably low time complexity.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  14. 274
  15. 275

    New primitives to AOP weaving capabilities for security hardening concerns by Mourad, Azzam

    Published 2007
    “…These primitives are called exportParameter and importParameter and are used to pass parameters between two point cuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  16. 276
  17. 277

    New aspect-oriented constructs for security hardening concerns by Mourad, Azzam

    Published 2009
    “…The two proposed primitives are called ExportParameter and ImportParameter and are used to pass parameters between two pointcuts. They allow to analyze a program's call graph in order to determine how to change function signatures for passing the parameters associated with a given security hardening. …”
    Get full text
    Get full text
    Get full text
    article
  18. 278

    Axes-Based Encryption Key by Haidar, Imane

    Published 2018
    “…This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  19. 279

    Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité by Mourad, Azzam

    Published 2009
    “…The two proposed primitives are called exportParameter and importParameter and are used to pass parameters between two pointcuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
    Get full text
    Get full text
    Get full text
    article
  20. 280

    An Introduction to the Special Issue “Protein Glycation in Food, Nutrition, Health and Disease” by Naila Rabbani (291722)

    Published 2022
    “…The keynote speaker was Lasker Laureate Professor Kazutoshi Mori, speaking on the unfolded protein response, and there were sessions on: glycation in obesity, diabetes, and diabetic complications; glycation in food; glycation through the life course—from maternal bonding to aging; glycation in plants—physiology, function, and food security; glycation in the COVID-19 response; glycation analytics and chemistry; glycation in kidney disease, cancer, and mental health; glycation-related imaging, diagnostic algorithms, and therapeutics; and methods and models in glycation research. …”