Search alternatives:
implementing based » implementing bundled (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
implementing based » implementing bundled (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
-
121
Efficiency Optimization of a Standalone Solar Energy System using Fuzzy Based MPPT
Published 2012Get full text
doctoralThesis -
122
Correlation Clustering with Overlaps
Published 2020“…Moreover, we allow the new vertex splitting operation, which allows the resulting clusters to overlap. In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …”
Get full text
Get full text
Get full text
masterThesis -
123
Boosting the visibility of services in microservice architecture
Published 2023“…These assessments can be performed by means of a live health-check service, or, alternatively, by making a prediction of the current state of affairs with the application of machine learning-based approaches. In this research, we evaluate the performance of several classification algorithms for estimating the quality of microservices using the QWS dataset containing traffic data of 2505 microservices. …”
-
124
Nonlinear Control of Brushless Dual-Fed Induction Generator With a Flywheel Energy Storage System for Improved System Performance
Published 2025“…In the first stage, a robust Sliding Mode Control (SMC)-based nonlinear decoupled control algorithm is designed to efficiently regulate BDFIG operation. …”
-
125
Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT)
Published 2015“…Looking at the historical data of students, fuzzy logic can be used to develop rules based on these data. Genetic Algorithm would be used to optimize the performance of the system.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
126
-
127
Correlation Clustering via s-Club Cluster Edge Deletion
Published 2023“…In certain situations, the requirement for clusters to be cliques was deemed excessively stringent, leading to the proposal of alternative relaxed clique models for dense subgraphs, such as s-club. In this work, we implement three approaches to tackle the 2-club clustering via edge deletion: a heuristic approach based on the influence of the edge to resolve maximum conflicts, a parameterized algorithm in which by deleting a maximum of k edges, the graph can be transformed into a 2-club cluster based on a branching algorithm, and the approach in Integer Linear Programming to find the optimized solution in an integer formulation. …”
Get full text
Get full text
Get full text
masterThesis -
128
Peak Loads Shaving in a Team of Cooperating Smart Buildings Powered Solar PV-Based Microgrids
Published 2021“…<p>This paper presents a scheduling framework based algorithm for reducing/shaving the peak loads in a team of cooperating microgrids (TCM) powered smart buildings taking advantages of vehicle-to-building (V2B) concept and operational flexibilities of electric vehicles (EVs). …”
-
129
-
130
Efficiency Optimization of a DSP-Based Standalone PV System Using Fuzzy Logic and Dual-MPPT Control
Published 2012“…The first MPPT controller is an astronomical two-axis sun tracker, which is designed to track the sun over both the azimuth and elevation angles and obtain maximum solar radiation at all times. The second MPPT algorithm controls the power converter between the PV panel and the load and implements a new fuzzy-logic (FLC)-based perturb and observe (P&O) scheme to keep the system power operating point at its maximum. …”
Get full text
article -
131
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …”
Get full text
-
132
Performance Analysis of a Three-to-Five Phase Dual Matrix Converter Based on Space Vector Pulse Width Modulation
Published 2019“…<p dir="ltr">In this paper, space vector pulse width modulation (SVPWM)-based algorithms for a five-phase open-end load fed from dual matrix converter (DMC) have been proposed. …”
-
133
-
134
Day-Ahead Load Demand Forecasting in Urban Community Cluster Microgrids Using Machine Learning Methods
Published 2022“…From the results, it is found that the Levenberg–Marquardt optimization algorithm-based ANN model gives the best electrical load forecasting results.…”
-
135
Blue collar laborers’ travel pattern recognition: Machine learning classifier approach
Published 2021“…A bagged Clustering algorithm was employed to identify the number of clusters, then the C-Means algorithm and the Pamk algorithm were implemented to validate the results. …”
-
136
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
Published 2023“…Moreover, the Reconciliate Multi-Agent Markov Learning (RMML) based classification algorithm is used to predict the intrusion with its appropriate classes. …”
-
137
MAESTRO: Orchestrating Computational Offloading to Multiple FemtoClouds in Various Communication Environments
Published 2022“…<p dir="ltr">Many novel IoT-based applications demand low latency, large compute resources, and high privacy. …”
-
138
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
Published 2024“…Based on the performance metrics, such as confusion matrix, training time, prediction time, accuracy, and Area Under the Receiver Operating Characteristic curve (AUC-ROC), it was established that SDN-ML-IoT, when applied to RF, outperforms other ML algorithms, as well as similar approaches related to our work. …”
-
139
-
140
Wearable wrist to finger photoplethysmogram translation through restoration using super operational neural networks based 1D-CycleGAN for enhancing cardiovascular monitoring
Published 2024“…Current signal processing techniques, and even state-of-the-art machine learning algorithms, frequently struggle to effectively restore the inherent bodily signals amidst the array of randomly generated distortions. …”