Search alternatives:
generation algorithm » genetic algorithm (Expand Search)
code generation » power generation (Expand Search), image generation (Expand Search)
generation algorithm » genetic algorithm (Expand Search)
code generation » power generation (Expand Search), image generation (Expand Search)
-
21
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security
Published 2024“…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …”
-
22
Automatic Video Summarization Using HEVC and CNN Features
Published 2022Get full text
doctoralThesis -
23
Developing a Cooperative Behavior for Multi Agents System Application to Robot Soccer
Published 2007Get full text
doctoralThesis -
24
-
25
Analysis of Using Machine Learning to Enhance the Efficiency of Facilities Management in the UAE
Published 2022“…Seasonal thresholds are set for sensor values, and the algorithm detects hazardous trends when values exceed safe limits, correlating them with related sensors to generate combined variables and error codes. …”
Get full text
-
26
Practical Multiple Node Failure Recovery in Distributed Storage Systems
Published 2016“…The fractional repetition (FR) code is a class of regenerating codes that consists of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
27
Optimized FPGA Implementation of PWAM-Based Control of Three—Phase Nine—Level Quasi Impedance Source Inverter
Published 2019“…Since, PWAM control algorithm is more complex than PSCPWM, FPGA based implementation for PWAM control is discussed. …”
-
28
Dynamic multiple node failure recovery in distributed storage systems
Published 2018“…We present a range of results for our proposed algorithms in several scenarios to assess the effectiveness of the solution approaches that are shown to generate results close to optimal.…”
Get full text
Get full text
Get full text
Get full text
article -
29
Optimizing overheating, lighting, and heating energy performances in Canadian school for climate change adaptation: Sensitivity analysis and multi-objective optimization methodolog...
Published 2023“…This paper aims to develop long-term adaptation strategies for the existing Canadian school buildings under extreme current and future climates using a developed methodology based on global and local sensitivity analysis and Multi-Objective Optimization Genetic Algorithm. The calibrated simulation model based on indoor and outdoor measured temperature for a school of interest is used to evaluate the optimization strategies. …”
Get full text
Get full text
Get full text
-
30
Prototype project management tool (PPMT) with cocomo calibration. (c1998)
Published 1998Get full text
Get full text
masterThesis -
31
Common weaving approach in mainstream languages for software security hardening
Published 2013“…In the first approach, we prove them according to the rules and algorithms provided in this paper. In the second approach, we accommodate Kniesel's discipline that ensures that security solutions specified by our approach are applied at all and only the required points in source code, taking into consideration weaving interactions and interferences. …”
Get full text
Get full text
Get full text
article -
32
Nonlinear analysis of shell structures using image processing and machine learning
Published 2023“…The proposed method in this paper is unique in that it converts the mechanical behaviour of shell structures into images that are then used to train a machine learning algorithm. This is achieved by mapping shell deformations and stresses to a set of images that are used to train a conditional generative adversarial network. …”
-
33
Assessment of Inventory and Transportation Collaboration in a Logistics Marketplace
Published 2020Get full text
doctoralThesis -
34
Dynamic single node failure recovery in distributed storage systems
Published 2017“…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …”
Get full text
Get full text
Get full text
Get full text
article -
35
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
Published 2017“…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …”
Get full text
Get full text
Get full text
article -
36
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
Published 2017“…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …”
Get full text
Get full text
Get full text
article