Search alternatives:
could algorithm » mould algorithm (Expand Search), carlo algorithm (Expand Search), colony algorithm (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
could algorithm » mould algorithm (Expand Search), carlo algorithm (Expand Search), colony algorithm (Expand Search)
a algorithm » _ algorithms (Expand Search), rd algorithm (Expand Search), jaya algorithm (Expand Search)
-
701
Thermodynamic Analysis and Optimization of Densely-Packed Receiver Assembly Components in High-Concentration CPVT Solar Collectors
Published 2016“…These components, namely multi-junction photovoltaic cells, segmented thermoelectric generators with interconnectors, and finned minichannel heat extractors, could be integrated to form CPVT receiver assemblies in a number of different configurations. Thermodynamic component-level analyses that avoid oversimplified as well as computationally-expensive modeling approaches and provide clear and robust simulation algorithms with reasonable accuracy are separately developed for the three addressed components. …”
Get full text
article -
702
On the complexity of bilinear computations
Published 1984“…Arithmetic complexity theory is the study of the minimum number of non-scalar multiplications required to compute a set of bilinear forms. One can show that we can restrict ourselves to bilinear algorithms. …”
Get full text
Get full text
Get full text
masterThesis -
703
H.264/AVC to HEVC Video Transcoder Based on Dynamic Thresholding and Content Modeling
Published 2014“…Then, two types of mode mapping algorithms are proposed. In the first solution, a single H.264/AVC coding parameter is used to determine the outgoing HEVC partitions using dynamic thresholding. …”
Get full text
article -
704
An Enhanced Approach for Solar PV Hosting Capacity Analysis in Distribution Networks
Published 2022“…The developed algorithms were tested on the IEEE 123 bus network, and their results were compared. …”
-
705
Radar Pulse Interleaving For Multi-Target Tracking
Published 2020“…Interleaving algorithms developed to operate radars exploit the dead-times between the transmitted and the received pulses to allocate new tracking tasks that might involve transmitting or receiving pulses, thus increasing the capacity of the system. …”
Get full text
article -
706
Machine Learning-Based Approach for EV Charging Behavior
Published 2021Get full text
doctoralThesis -
707
Crashworthiness optimization of composite hexagonal ring system using random forest classification and artificial neural network
Published 2024“…The ultimate target is to develop a robust multi-modal machine learning method to predict the optimum geometry (i.e., hexagonal ring angle) and suitable in-plane crushing arrangements of the hexagonal ring system for targeted crashworthiness parameters. …”
-
708
Four quadrant robust quick response optimally efficient inverterfed induction motor drive
Published 1989“…The control algorithms developed are readily implementable with present-day microprocessors…”
Get full text
Get full text
article -
709
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
Published 2015“…All the approach components and algorithms realizing the proposed analysis semantics have been implemented in one development framework. …”
Get full text
Get full text
Get full text
article -
710
Sense and Learn: Recent Advances in Wearable Sensing and Machine Learning for Blood Glucose Monitoring and Trend-Detection
Published 2022“…</p><h2>Other Information</h2><p dir="ltr">Published in: Frontiers in Bioengineering and Biotechnology<br>License: <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.3389/fbioe.2022.876672" target="_blank">https://dx.doi.org/10.3389/fbioe.2022.876672</a></p>…”
-
711
Deploying model obfuscation: towards the privacy of decision-making models on shared platforms
Published 2024“…To this end, we propose a conceptual and algorithmic framework of a model obfuscation scheme. …”
Get full text
Get full text
-
712
Blood-Based Proteomic Profiling Identifies Potential Biomarker Candidates and Pathogenic Pathways in Dementia
Published 2023“…Identifying the minimally invasive biomarkers associated with dementia that could provide insights into the disease pathogenesis, improve early diagnosis, and facilitate the development of effective treatments is pressing. Proteomic studies have emerged as a promising approach for identifying the protein biomarkers associated with dementia. …”
-
713
Autopilot Design and Commercial Autopilot Evaluation Using Flybarless Helicopter
Published 2014Get full text
doctoralThesis -
714
An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection
Published 2022“…The binary enhanced RSO is built based on three successive modifications: i) an S-shape transfer function is used to develop binary RSO algorithms; ii) the local search paradigm of particle swarm optimization is used with the iterative loop of RSO to boost its local exploitation; iii) three crossover mechanisms are used and controlled by a switch probability to improve the diversity. …”
-
715
Connectionist technique estimates of hydrogen storage capacity on metal hydrides using hybrid GAPSO-LSSVM approach
Published 2024“…Meanwhile, the estimation of hydrogen storage capacity will accelerate their development procedure. Machine learning algorithms can predict the correlation between the metal hydride chemical composition and its hydrogen storage capacity. …”
-
716
Comparative Study on Arabic Text Classification: Challenges and Opportunities
Published 2022“…This made finding certain text classification algorithms that fit a specific language or a set of languages a difficult task for researchers. …”
Get full text
-
717
Machine Learning Techniques for Pharmaceutical Bioinformatics
Published 2018“…In this matrix, each drug is represented by a vector of attributes from all other drugs. A predictive model is developed to predict drug indication as well as to predict new DDIs using multiple machine learning algorithms. …”
Get full text
-
718
Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security
Published 2024“…These benchmark datasets contain a variety of multivariate IoT attacks. The aim is to demonstrate the robustness of the proposed algorithms in effectively identifying telnet, password, distributed denial of service (DDoS), injection, and backdoor vulnerabilities in IoT ecosystems. …”
-
719
Discrimination between genuine and acted expressions using EEG signals and machine learning
Published 2019Get full text
doctoralThesis -
720
Common weaving approach in mainstream languages for software security hardening
Published 2013“…GIMPLE weaving accompanied by a common aspect-oriented language (1) allows security experts providing security solutions using this common language, (2) lets developers focus on the main functionality of programs by relieving them from the burden of security issues, (3) unifies the matching and the weaving processes for mainstream languages, and (4) facilitates introducing new security features in AOP languages. …”
Get full text
Get full text
Get full text
article