Showing 341 - 360 results of 548 for search '(( elements search algorithm ) OR ((( data code algorithm ) OR ( based method algorithm ))))', query time: 0.12s Refine Results
  1. 341

    Dynamic multiple node failure recovery in distributed storage systems by Itani, May

    Published 2018
    “…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  2. 342

    Heat rate curve approximation for power plants without data measuring devices by Poullikkas, Andreas

    Published 2012
    “…The method is applied on a given power system, in which we calculate the electricity cost using the CAPSE (computer aided power economics) algorithm. …”
    Get full text
    article
  3. 343

    Optimum Track to Track Fusion Using CMA-ES and LSTM Techniques by Fares, Samar

    Published 2024
    “…The sensors are unbiased radars with fixed locations. The first method uses an offline technique based on a global optimizer called the CMA-ES algorithm and the second one uses LSTM in its different forms to learn the online adjustment of the fusion weights between the two tracks. …”
    Get full text
  4. 344
  5. 345

    On the Generation of Quantified Lemmas by Gabriel Ebner (23277217)

    Published 2018
    “…<p dir="ltr">In this paper we present an algorithmic method of lemma introduction. Given a proof in predicate logic with equality the algorithm is capable of introducing several universal lemmas. …”
  6. 346
  7. 347

    Optimization metaheuristic for software testing by Mansour, Nashat

    Published 2013
    “…This paper presents an evolutionary method for testing web applications. Although state-based testing has been reported, few papers have addressed modern web applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 348
  9. 349

    A matheuristic approach for solving the 2-connected dominating set problem by Raka Jovanovic (17947838)

    Published 2019
    “…The algorithm is based on a Greedy Randomized Adaptive Search Procedure (GRASP). …”
  10. 350

    On Indefinite Quadratic Optimization over the Intersection of Balls and Linear Constraints by Temadher A. Almaadeed (14151288)

    Published 2022
    “…To solve e-TRS, we use the alternating direction method of multipliers approach and a branch and bound algorithm. …”
  11. 351

    Localization of Damages in Plain And Riveted Aluminium Specimens using Lamb Waves by S. Andhale, Yogesh

    Published 2018
    “…The genetic optimization (GO) method is used to further refine the location of damage within the enclosed area obtained using astroid algorithm. …”
    Get full text
  12. 352

    Fast Transient Stability Assessment of Power Systems Using Optimized Temporal Convolutional Networks by Mohamed Massaoudi (16888710)

    Published 2024
    “…This article introduces an efficient transient stability status prediction method based on deep temporal convolutional networks (TCNs). …”
  13. 353

    Applications of fast fourier transform in the integrity evaluation of deep foundations by Abi Shdid, Caesar

    Published 2016
    “…The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  14. 354

    Efficient Scalable VLSI Architecture for Montgomery Inversion in GF(p) by Gutub, Adnan

    Published 2004
    “…We suggest a new correction phase for a previously proposed almost Montgomery inverse algorithm to calculate the inversion in hardware. We also propose an efficient hardware algorithm to compute the inverse by multi-bit shifting method. …”
    Get full text
    Get full text
    article
  15. 355

    RFID localization using single reader antenna. (c2014) by Msheik, Hamze

    Published 2016
    “…Our scheme is based on Power Map Matching algorithm. The proposed method employs the use of a Single Stationary Reader Antenna and multitags placed on the asset. …”
    Get full text
    Get full text
    masterThesis
  16. 356

    Impacts of Feeder Reconfiguration on Renewable Resources Allocation in Balanced and Unbalanced Distribution Systems by Zidan, Aboelsood A.

    Published 2016
    “…In this article, network reconfiguration and distributed generation allocation in distribution networks are dealt with simultaneously while imposing an objective of minimizing energy loss. The proposed method, which is based on a genetic algorithm, takes into consideration the uncertainty related to renewable distributed generation output power and the load variability. …”
    Get full text
    article
  17. 357

    Reconfigured Photovoltaic Model to Facilitate Maximum Power Point Tracking for Micro and Nano-Grid Systems by J. Prasanth Ram (19499062)

    Published 2022
    “…This enables the use of a simple Perturb and Observe (P&O) algorithm to easily track GMPP. For reconfiguration, a simple 5 × 5 PV array is considered, and a new physical relocation procedure based on the position square method is proposed. …”
  18. 358

    Radial basis function networks for contingency analysis of bulkpower systems by Refaee, J.A.

    Published 1999
    “…Unlike most of the available neural networks based techniques, the proposed method utilizes the potential of RBFN in planning studies. …”
    Get full text
    Get full text
    article
  19. 359
  20. 360

    Automation of the Arabic sign language recognition by Mohandes, M.

    Published 2004
    “…This paper introduces a system to recognize the Arabic sign language using an instrumented glove and a machine learning method. Interfaces in sign language systems can be categorized as direct-device or vision-based. …”
    Get full text
    Get full text
    article