Search alternatives:
system algorithm » swarm algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
work algorithm » swarm algorithm (Expand Search), rd algorithm (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
system algorithm » swarm algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
work algorithm » swarm algorithm (Expand Search), rd algorithm (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
-
81
Extended Behavioral Modeling of FET and Lattice-Mismatched HEMT Devices
Published 2016Get full text
doctoralThesis -
82
-
83
Simultaneous analysis of frequency and voltage control of the interconnected hybrid power system in presence of FACTS devices and demand response scheme
Published 2021“…<p dir="ltr">This work confers the simultaneous analysis of voltage and frequency control of the 3-area interconnected hybrid power system (IHPS) consisting of parabolic-trough solar power system (PSP), wind power system (WPS) and dish-stirling solar power system (DSP) under the paradigm of microgrid. …”
-
84
An Ultrafast Maximum Power Point Setting Scheme for Photovoltaic Arrays Using Model Parameter Identification
Published 2015“…Subsequently a simple but effective global MPPT algorithm is proposed to track the MPP in the overallP-Icurve obtained from the identified PV array model, ensuring that the converter works at the MPP. …”
-
85
Android Malware Detection Using Machine Learning
Published 2024“…In this work, several machine learning algorithms were utilized, namely k-Nearest neighbor (KNN), Decision Trees (DT), Naive Bayes (NB), Support Vector Machine (SVM) and other ensemble classifiers including Extreme Gradient Boosting (XGBoost), Light Gradient Boosting Machine (LGBM) and CatBoost. …”
Get full text
article -
86
Enhanced PSO-Based NN for Failures Detection in Uncertain Wind Energy Systems
Published 2023“…First, a feature selection tool using PSO Algorithm is developed. Then, in order to maximize the diversity between data samples and improve the effectiveness of using PSO algorithm for feature selection, the Euclidean distance metric is used in order to reduce the data and maximize the diversity between data samples. …”
-
87
-
88
-
89
A Survey of Machine Learning Innovations in Ambulance Services: Allocation, Routing, and Demand Estimation
Published 2024“…Through this survey, we aim to offer valuable insights into the current state of research and practices, shedding light on potential areas for future exploration and development. The findings presented in this paper serve as a foundation for researchers and practitioners working towards enhancing the efficiency of ambulance deployment in EMS.…”
-
90
-
91
-
92
An exact and general model order reduction technique for the finite element solution of elastohydrodynamic lubrication problems
Published 2017“…As such, it is exact and it preserves the generality of the solution scheme while reducing the size of its corresponding model and, consequently, the associated computational overhead. The technique is complemented with a splitting algorithm to alleviate the hurdle of solving an arising semidense matrix system. …”
Get full text
Get full text
Get full text
Get full text
article -
93
The monotone circuit value problem with bounded genus is in NC
Published 2017“…We present an efficient parallel algorithm for the general Monotone Circuit Value Problem (MCVP) with n gates and an underlying graph of bounded genus k. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
94
Deep Reinforcement Learning for Resource Constrained HLS Scheduling
Published 2022“…The two main steps in HLS are: operations scheduling and data-path allocation. In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. …”
Get full text
Get full text
Get full text
masterThesis -
95
Data Generation for Path Testing
Published 2004“…We present two stochastic search algorithms for generating test cases that execute specified paths in a program. …”
Get full text
Get full text
Get full text
article -
96
Autonomous 3D Deployment of Aerial Base Stations in Wireless Networks with User Mobility
Published 2019“…We present performance results for the algorithm as a function of various system parameters assuming a random walk mobility model. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
97
-
98
Information warfare. (c2015)
Published 2015“…Numerous damage assessment and recovery algorithms have been proposed by researchers. In this work we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
Get full text
Get full text
masterThesis -
99
Information warfare recovery-fighting back through the matrix. (c2012)
Published 2012Get full text
Get full text
masterThesis -
100
Information warfare
Published 2017“…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
Get full text
Get full text
Get full text
Get full text
article