Search alternatives:
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
-
121
Optimal Sizing and Techno-Economic Analysis of Hybrid Renewable Energy Systems—A Case Study of a Photovoltaic/Wind/Battery/Diesel System in Fanisau, Northern Nigeria
Published 2020“…In the first step, the MATLAB environment was used to run simulations and optimize the system via the genetic algorithm. Then, techno-economic and emissions analysis was carried out in the second step to compare the proposed system to the existing traditional modes of rural electrification in sub-Saharan Africa, namely, the grid-extension and diesel generator. …”
-
122
Could Petrol Stations Play a Key Role in Transportation Electrification? A GIS-Based Coverage Maximization of Fast EV Chargers in Urban Environment
Published 2022“…The spatial optimization problem is solved using a linear-programming relaxation based MCLP algorithm developed in Python. Five cities with growing populations, namely San Clara, CA, Salt Lake City, UT, Raleigh, NC, Denver, CO, and Los Angeles, CA, are chosen as case studies. …”
-
123
-
124
Learning-Based Spectrum Sensing and Access for Cognitive Radio Systems
Published 2015Get full text
doctoralThesis -
125
Artificial Intelligence for Cochlear Implants: Review of Strategies, Challenges, and Perspectives
Published 2024“…The process involves receiving the speech signal in analog form, followed by various signal processing algorithms to make it compatible with devices of limited capacities, such as cochlear implants (CIs). …”
-
126
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
Published 2024“…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …”
-
127
-
128
Impact Of Multidisciplinary Maternal Resuscitation Training Program on Improving the Front-Line Care Provider’s Readiness to Manage Maternal Cardiac Arrest: A Pre-test/Post-test St...
Published 2024“…The multidisciplinary resuscitation teams were observed during the cardiac arrest mock drills both before and after conducting the multidisciplinary resuscitation simulation-based training program and the introduction of the maternal resuscitation algorithm pathway against seven KPIs. Those KPIs were Time to Confirm Cardiac Arrest; Code Blue and /or Code White Activation Time; Time to attempt first chest compression; Defibrillator Arrival Time; Time to First Defibrillation shock; Code blue/code white arrival time and Time to perform Perimortem Caesarean Delivery.…”
-
129
Computation of conformal invariants
Published 2020“…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …”
Get full text
Get full text
Get full text
article -
130
Computation of conformal invariants
Published 2021“…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …”
-
131
Analysis of Using Machine Learning to Enhance the Efficiency of Facilities Management in the UAE
Published 2022“…This study addresses these issues by Implementing Machine Learning (ML) algorithms using data from Building Management Systems (BMS) and FM maintenance reports, focussing on predictive maintenance for Fresh Air Handling Units. …”
Get full text
-
132
A survey and comparison of wormhole routing techniques in a meshnetworks
Published 1997“…These multiprocessing systems consist of processing elements or nodes which are connected together by interconnection networks in various topologies. …”
Get full text
Get full text
article -
133
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security
Published 2024“…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …”
-
134
An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation
Published 2001“…Sequential circuit test generation using deterministic, fault-oriented algorithms is highly complex and time consuming. New approaches are needed to enhance the existing techniques, both to reduce execution time and improve fault coverage. …”
Get full text
article -
135
An evolutionary meta-heuristic for state justification insequential automatic test pattern generation
Published 2001“…Sequential circuit test generation using deterministic, fault-oriented algorithms is highly complex and time consuming. New approaches are needed to enhance the existing techniques, both the reduce execution time and improve fault coverage. …”
Get full text
Get full text
article -
136
Downlink channel estimation for IMT-DS
Published 2001“…IMT-DS system is an approved terrestrial radio interface standard for 3G mobile communication based on direct sequence code division multiple access (DS-CDMA). It employs a RAKE receiver to exploit multipath diversity. …”
Get full text
Get full text
article -
137
Recovery of business intelligence systems
Published 2018“…Reducing the execution time of recovery is the key target of our algorithm. The proposed algorithm outperforms the existing algorithm. …”
Get full text
Get full text
Get full text
Get full text
article -
138
The Use of Enumerative Techniques in Topological Optimization of Computer Networks Subject to Fault Tolerance and Reliability
Published 2003“…Existing enumeration-based techniques for solving this network optimization problem ignore the fault-tolerance aspect in their solution. …”
Get full text
article -
139
Efficient unified Montgomery inversion with multi-bit shifting
Published 2005“…Computation of multiplicative inverses in finite fields GF( p) and GF(2n) is the most time consuming operation in elliptic curve cryptography, especially when affine co-ordinates are used. Since the existing algorithms based on the extended Euclidean algorithm do not permit a fast software implementation, projective co-ordinates, which eliminate almost all of the inversion operations from the curve arithmetic, are preferred. …”
Get full text
Get full text
article -
140
Rate Adaptation in Dynamic Adaptive Video Streaming Over HTTP
Published 2021Get full text
doctoralThesis