Search alternatives:
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data finding » data mining (Expand Search), data hiding (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data finding » data mining (Expand Search), data hiding (Expand Search)
-
241
A clustering metaheuristic for large orienteering problems
Published 2022“…In particular, using a state-of-the-art heuristic and an exact algorithm, we have shown that it is significantly beneficial to use the Orienteering Problem algorithm plugged into our metaheuristic, as opposed to using it as a standalone algorithm. …”
-
242
A method for efficient NoC test scheduling using deterministic routing
Published 2017“…The method uses a deterministic routing algorithm that minimizes test time while avoiding blocking. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
243
Direct sensitivity analysis of nonlinear distortion in RF circuits using multidimensional moments
Published 2014“…Sensitivity analysis is a critically important aspect in the simulation of integrated circuits. It allows the designer to perform vital tasks such as circuit optimization and design space exploration. …”
Get full text
Get full text
Get full text
Get full text
article -
244
Vibration suppression in a cantilever beam using a string-type vibration absorber
Published 2017“…The string is rigidly connected to the fixed end of the beam and through a spring and damper to a second point on the beam. The finite element method is used to model the system and a reduced order model is obtained through modal reduction performed on both the string and the beam. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
245
KT2C. (c2014)
Published 2016“…We introduce the K-way Thermal Chip Clustering (KT2C) algorithm; a VLSI chip partitioning algorithm that is used to reduce the chip’s temperature and prevent the formation of hotspots. …”
Get full text
Get full text
masterThesis -
246
Discrimination between genuine and acted expressions using EEG signals and machine learning
Published 2019Get full text
doctoralThesis -
247
-
248
Practical single node failure recovery using fractional repetition codes in data centers
Published 2016“…Hence, a practical solution for node failures is presented by using a self-designed genetic algorithm that searches within the feasible solution space. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
249
The Use of Enumerative Techniques in Topological Optimization of Computer Networks Subject to Fault Tolerance and Reliability
Published 2003“…Experimental results obtained from a set of randomly generated networks using the proposed algorithms are presented and compared to those obtained using the existing techniques [1], [2]. …”
Get full text
article -
250
Efficiency Optimization of a Standalone Solar Energy System using Fuzzy Based MPPT
Published 2012Get full text
doctoralThesis -
251
Experimental Investigation and Comparative Evaluation of Standard Level Shifted Multi-Carrier Modulation Schemes With a Constraint GA Based SHE Techniques for a Seven-Level PUC Inv...
Published 2019“…Obtained findings with design of dc voltage and load current controllers are elaborated and presented in this paper. …”
-
252
Adaptive temperature control of a reverse flow process by using reinforcement learning approach
Published 2024“…It should be mentioned that this approach is not reliant on the internal dynamics of the CFRR system, which is a complex process and is most effectively modeled using Partial Differential Equations (PDEs). The convergence of the iteration algorithm is established, assuming the initial policy is stabilizing. …”
-
253
Isolating Physical Replacement of Identical IoT Devices Using Machine and Deep Learning Approaches
Published 2021Get full text
doctoralThesis -
254
Auto Takeoff and Precision Landing using Integrated GPS/INS/Optical Flow Solution
Published 2015Get full text
doctoralThesis -
255
Definition and selection of fuzzy sets in genetic‐fuzzy systems using the concept of fuzzimetric arcs
Published 2008“…Purpose – This paper seeks to identify and propose a standard approach for the selection and optimization of fuzzy sets used in fuzzy decision‐making systems. Design/methodology/approach – The design was based on two principles: selection and optimization. …”
Get full text
Get full text
Get full text
Get full text
article -
256
Cuckoo search for portfolio optimization. (c2014)
Published 2014Get full text
Get full text
masterThesis -
257
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …”
Get full text
-
258
A Framework for Predictive Modeling in Sustainable Projects
Published 2012Get full text
doctoralThesis -
259
Enhancing Breast Cancer Diagnosis With Bidirectional Recurrent Neural Networks: A Novel Approach for Histopathological Image Multi-Classification
Published 2025“…<p dir="ltr">In recent years, deep learning methods have dramatically improved medical image analysis, though earlier models faced difficulties in capturing intricate spatial and contextual details. …”
-
260
Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks
Published 2022“…This study considers determining the optimal size of a homogeneous fleet of trucks to be outsourced (or subcontracted) from a third-party logistics provider to be used daily to cyclically transport different types of raw materials from designated storage yards to intermediate buffer locations to be fed as inputs to a production facility for processing. …”