Search alternatives:
method algorithm » mould algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
implementing ii » implementing iot (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
element » elements (Expand Search)
method algorithm » mould algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
implementing ii » implementing iot (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
element » elements (Expand Search)
-
161
OPTIMAL SHUNT COMPENSATORS AT NON-SINUSOIDAL BUSBARS
Published 2020“…The model for the nonlinear load is a two variable problem in L (inductor) and C (capacitor). …”
Get full text
article -
162
-
163
Blue collar laborers’ travel pattern recognition: Machine learning classifier approach
Published 2021“…A bagged Clustering algorithm was employed to identify the number of clusters, then the C-Means algorithm and the Pamk algorithm were implemented to validate the results. …”
-
164
Estimating Vehicle State by GPS/IMU Fusion with Vehicle Dynamics
Published 2013Get full text
doctoralThesis -
165
Computation of conformal invariants
Published 2021“…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …”
-
166
Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning
Published 2008“…This is due to some contone values cannot be fetched in the same cycle because some other contone value is being fetched from the s-LUT. The complete implementation of the algorithm requires two CPLD devices for computational portion, external content addressable memories (CAM) and static RAMs to store s-LUTs.…”
Get full text
article -
167
Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning
Published 2007“…This is due to some contone values cannot be fetched in the same cycle because some other contone value is being fetched from the s-LUT. The complete implementation of the algorithm requires two CPLD devices for computational portion, external content addressable memories (CAM) and static RAMs to store s-LUTs.…”
Get full text
article -
168
Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning
Published 2008“…This is due to some contone values cannot be fetched in the same cycle because some other contone value is being fetched from the s-LUT. The complete implementation of the algorithm requires two CPLD devices for computational portion, external content addressable memories (CAM) and static RAMs to store s-LUTs.…”
Get full text
article -
169
-
170
Efficient unified Montgomery inversion with multi-bit shifting
Published 2005“…They present two inversion algorithms for binary extension and prime fields, which are slightly modified versions of the Montgomery inversion algorithm. …”
Get full text
Get full text
article -
171
A PLC based power factor controller for a 3-phase induction motor
Published 2000Get full text
Get full text
article -
172
A combinatorial auction‐based approach for ridesharing in a student transportation system
Published 2023“…Three meta-heuristics, namely particle swarm optimization, dragonfly algorithm, and imperialist competitive algorithm, are implemented in the proposed framework, whose performances are assessed and compared. …”
-
173
Benchmarking Concept Drift Detectors for Online Machine Learning
Published 2022“…To guarantee a fair com parison, MOA is used. Fourteen algorithms are implemented in MOA. We integrate two new algorithms (ADWIN++ and SDDM) into MOA.…”
Get full text
Get full text
Get full text
-
174
Localizing-ground Transmitters Using Airborne Antenna Array
Published 2020Get full text
doctoralThesis -
175
-
176
Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring
Published 2020“…However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. …”
-
177
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. The performance evaluation using standard datasets demonstrates that the proposed model provides an accuracy of up to 99.99%.…”
-
178
Peak Loads Shaving in a Team of Cooperating Smart Buildings Powered Solar PV-Based Microgrids
Published 2021“…<p>This paper presents a scheduling framework based algorithm for reducing/shaving the peak loads in a team of cooperating microgrids (TCM) powered smart buildings taking advantages of vehicle-to-building (V2B) concept and operational flexibilities of electric vehicles (EVs). …”
-
179
-
180
New aspect-oriented constructs for security hardening concerns
Published 2009“…Moreover, we show the viability and correctness of the proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the result of explanatory case studies.…”
Get full text
Get full text
Get full text
article