Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
new algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
new algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
-
41
Developing a Cooperative Behavior for Multi Agents System Application to Robot Soccer
Published 2007Get full text
doctoralThesis -
42
Optimizing ADWIN for Steady Streams
Published 2022“…However, the drift detection accuracy of these variants was not compared with the original algorithm. Moreover, there is no study concerning the memory consumption of the variants and the origi nal algorithm. …”
Get full text
Get full text
Get full text
-
43
Efficiency Optimization of a DSP-Based Standalone PV System Using Fuzzy Logic and Dual-MPPT Control
Published 2012“…The first MPPT controller is an astronomical two-axis sun tracker, which is designed to track the sun over both the azimuth and elevation angles and obtain maximum solar radiation at all times. The second MPPT algorithm controls the power converter between the PV panel and the load and implements a new fuzzy-logic (FLC)-based perturb and observe (P&O) scheme to keep the system power operating point at its maximum. …”
Get full text
article -
44
Design of a vibration absorber for harmonically forced damped systems
Published 2013“…Two different numerical approaches are used in solving the problem; the first is based on the genetic algorithm technique and the second on the downhill simplex method. …”
Get full text
Get full text
Get full text
Get full text
article -
45
Prototype project management tool (PPMT) with cocomo calibration. (c1998)
Published 1998Get full text
Get full text
masterThesis -
46
A modified optimal design of a vibration absorber for ground motion isolation
Published 2014“…The first is based on the genetic algorithm technique and the second on the downhill simplex method. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
47
Fault Diagnosis Based Machine Learning and Fault Tolerant Control of Multicellular Converter Used in Photovoltaic Water Pumping System
Published 2023“…In this study, a photovoltaic water pumping system with two power converters, the first is used to extract the maximum power using the maximum power point tracking (MPPT) algorithm, and the second is a three-cell multicellular power converter used to control the DC motor with a submerged pump. …”
-
48
Autonomous Vehicles Delivery Systems: Analyzing Vehicle Routing Problems with a Moving Depot
Published 2019Get full text
doctoralThesis -
49
Intelligent route to design efficient CO<sub>2</sub> reduction electrocatalysts using ANFIS optimized by GA and PSO
Published 2022“…The primary purpose of this study is to establish a new model through machine learning methods; namely, adaptive neuro-fuzzy inference system (ANFIS) combined with particle swarm optimization (PSO) and genetic algorithm (GA) for the prediction of *CO (the key intermediate) adsorption energy as the efficiency metric. …”
-
50
Mobile Robot Navigation in Dynamic Environments Using an Improved RRT* Approach
Published 2018Get full text
doctoralThesis -
51
Oversampling techniques for imbalanced data in regression
Published 2024“…For tabular data, we also present the Auto-Inflater neural network, utilizing an exponential loss function for Autoencoders. …”
-
52
Optimal Dispatch of Mobile Energy Storage Unit to Support EV Charging Stations
Published 2021Get full text
doctoralThesis -
53
Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité
Published 2009“…In this paper, we present two new pointcuts and two new Primitives to AspectOriented Programming (AOP) languages that are needed for systematic hardening of security concerns. …”
Get full text
Get full text
Get full text
article -
54
An aspect-oriented framework for systematic security hardening of software
Published 2008“…We also illustrate the feasibility of the elaborated framework by developing several security hardening case studies that deal with known security requirements and vulnerabilities and applying them on large scale software. Second, we enrich SHL and the aspect-oriented languages with new pointcut and primitive constructs ( GAFlow, GDFlow, ExportParameter and ImportParameter ) that provide features missing in the current AOP proposals and needed for systematic security hardening concerns. …”
Get full text
Get full text
Get full text
masterThesis -
55
H.264/AVC to HEVC Video Transcoder Based on Dynamic Thresholding and Content Modeling
Published 2014“…The new video coding standard, HEVC, was developed to succeed the current standard, H.264/AVC, as the state of the art in video compression. …”
Get full text
article -
56
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
Published 2015“…First, our approach resolves the complexity of policies by elaborating an intermediate set-based representation to which the elements of XACML are automatically converted. Second, it allows to detect flaws, conflicts and redundancies between rules by offering new mechanisms to analyze the meaning of policy rules through semantics verification by inference rule structure and deductive logic. …”
Get full text
Get full text
Get full text
article -
57
Edge Caching in Fog-Based Sensor Networks through Deep Learning-Associated Quantum Computing Framework
Published 2022“…Firstly, the DL agent prioritizes caching contents via self organizing maps (SOMs) algorithm, and secondly, the prioritized contents are stored in QMM using a Two-Level Spin Quantum Phenomenon (TLSQP). …”
-
58
An exact and general model order reduction technique for the finite element solution of elastohydrodynamic lubrication problems
Published 2017“…The technique is complemented with a splitting algorithm to alleviate the hurdle of solving an arising semidense matrix system. …”
Get full text
Get full text
Get full text
Get full text
article -
59
Common weaving approach in mainstream languages for software security hardening
Published 2013“…In the first approach, we prove them according to the rules and algorithms provided in this paper. In the second approach, we accommodate Kniesel's discipline that ensures that security solutions specified by our approach are applied at all and only the required points in source code, taking into consideration weaving interactions and interferences. …”
Get full text
Get full text
Get full text
article -
60
Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn...
Published 2020“…ML in bioinformatics and epidemiology in particular grew drastically, powered by the proliferation of Electronic Medical Records (EMR) in healthcare systems worldwide and the efficiency of new programmatic and computational tools supporting Artificial Intelligence (AI) application. …”
Get full text