Showing 301 - 320 results of 349 for search '(( algorithm machine function ) OR ( ((algorithm a) OR (algorithm its)) function ))', query time: 0.11s Refine Results
  1. 301

    Prediction of biogas production from chemically treated co-digested agricultural waste using artificial neural network by Fares Almomani (12585685)

    Published 2020
    “…The developed model can be used to forecast the CMP as a function of operating temperature, the substrate composition, and chemical dose, and can be used for scaling-up and cost analysis purposes.…”
  2. 302

    Scatter search for homology modeling by Mansour, Nashat

    Published 2016
    “…The metaheuristic optimizes the initial poor alignments and uses fitness functions. We assess our algorithm on a number of proteins whose structures are present in the Protein Data Bank and which have been used in previous literature. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  3. 303

    Small-Signal Stability Analysis and Parameters Optimization of Virtual Synchronous Generator for Low-Inertia Power System by Alaa Altawallbeh (22565837)

    Published 2025
    “…Through systematic eigenvalue analysis and parameter sensitivity studies, complemented by time-domain verification in MATLAB/SIMULINK, we demonstrate the decisive influence of VSG control parameters on low-frequency oscillation (LFO) damping characteristics, transient frequency stability metrics, including the rate of change of frequency (ROCOF), maximum frequency deviation (<i>fnadir</i>), overshoot, and settling time. We further propose a hybrid Particle Swarm Optimization (PSO) algorithm with a multi-objective cost function to optimize VSG controller gains. …”
  4. 304

    Entire hypergeometric approximants for the ground state energy perturbation series of the quartic, sextic and octic anharmonic oscillators by I.S. Elkamash (16810689)

    Published 2023
    “…Besides, in literature, we barely can find a resummation algorithm for which the convergence is faster for stronglydivergent ( Gevrey − k , k > 1) series than a divergent one ( Gevrey − 1 ). …”
  5. 305
  6. 306

    Power matching approach for GPS coverage extension by Saab, Samer S.

    Published 2006
    “…Commercial automobile navigation systems currently employ a GPS receiver coupled with a dead reckoning (DR) system and a map-matching algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 307
  8. 308

    Singularly perturbed nonlinear ODEs and interior point optimizationalgorithms by Ezzine, J.

    Published 1995
    “…This paper explores the continuous realizations of iterative processes emanating from interior point optimization algorithms, and their connection with nonlinear singularly-perturbed ordinary differential equations. …”
    Get full text
    Get full text
    article
  9. 309

    Iterative heuristics for multiobjective VLSI standard cellplacement by Sait, Sadiq M.

    Published 2001
    “…Fuzzy rules are incorporated in order to design a multiobjective cost function that integrates the costs of three objectives in a single overall cost value. …”
    Get full text
    Get full text
    article
  10. 310

    FoGMatch by Arisdakessian, Sarhad

    Published 2019
    “…Our solution consists of (1) two optimization problems, one for the IoT devices and one for the fog nodes, (2) preference functions for both the IoT and fog layers to help them rank each other on the basis of several criteria such latency and resource utilization, and (3) centralized and distributed intelligent scheduling algorithms that consider the preferences of both the fog and IoT layers to improve the performance of the overall IoT ecosystem. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  11. 311

    EVOLUTIONARY HEURISTICS FOR MULTIOBJECTIVE VLSI NETLIST BI-PARTITIONING by Sait, Sadiq M.

    Published 2020
    “…Fuzzy rules are incorporated in order to design a multiobjective cost function. Both the techniques are applied to ISCAS-85/89 benchmark circuits and experimental results are reported and compared.…”
    Get full text
    article
  12. 312

    General iterative heuristics for VLSI multiobjective partitioning by Sait, Sadiq M.

    Published 2003
    “…These heuristics are based on Genetic Algorithms (GAs) and Tabu Search (TS) and incorporate fuzzy rules in order to handle the multiobjective cost function. …”
    Get full text
    Get full text
    article
  13. 313

    Design and development of an embedded controller for roboticmanipulator by Bakhashwain, J.M.

    Published 1998
    “…MPA is capable of determining a simplified control law by selecting the most dominant terms from a library of nonlinear functions associated with the robot's equations of motion. …”
    Get full text
    Get full text
    article
  14. 314

    New primitives to AOP weaving capabilities for security hardening concerns by Mourad, Azzam

    Published 2007
    “…These primitives are called exportParameter and importParameter and are used to pass parameters between two point cuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 315

    FAST FUZZY FORCE-DIRECTED/SIMULATED EVOLUTION METAHEURISTIC FOR MULTIOBJECTIVE VLSI CELL PLACEMENT by Sait, Sadiq M.

    Published 2006
    “…New fuzzy aggregation functions are proposed. SE is hybridized with force directed algorithm to speed-up the search. …”
    Get full text
    article
  16. 316
  17. 317

    Design of adaptive arrays based on element position perturbations by Dawoud, M.M.

    Published 1993
    “…The array comprises a signal processor, digital control algorithm (PID), stepper motors, shaft encoders, actuators and multiplexers. …”
    Get full text
    Get full text
    article
  18. 318

    Axes-Based Encryption Key by Haidar, Imane

    Published 2018
    “…This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  19. 319

    New aspect-oriented constructs for security hardening concerns by Mourad, Azzam

    Published 2009
    “…The two proposed primitives are called ExportParameter and ImportParameter and are used to pass parameters between two pointcuts. They allow to analyze a program's call graph in order to determine how to change function signatures for passing the parameters associated with a given security hardening. …”
    Get full text
    Get full text
    Get full text
    article
  20. 320

    Genetic Fuzzimetric Technique (GFT) by Kouatli, Issam

    Published 2012
    “…Integration of fuzzy systems with genetic algorithm has been identified by researchers as a useful technique of optimizing systems under uncertainty. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject