-
281
ANT-colony optimization-direct torque control for a doubly fed induction motor : An experimental validation
Published 2022“…The best solutions adopted in this situation are often based on optimization algorithms that generate the controller’s gains in each period where there is an internal or external perturbation, adapting the behaviors of the PID against the system’s nonlinearity. …”
-
282
Applications of fast fourier transform in the integrity evaluation of deep foundations
Published 2016“…The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …”
Get full text
Get full text
Get full text
Get full text
article -
283
-
284
Unsupervised Deep Learning for Classification Of Bats Calls Using Acoustic Data
Published 2021Get full text
doctoralThesis -
285
Development of Machine Learning Models for Studying the Premixed Turbulent Combustion of Gas-To-Liquids (GTL) Fuel Blends
Published 2024“…In addition, the possible minimum and maximum values of responses at the corresponding operating parameters are found using a genetic algorithm (GA) approach. Model 1 could capture the computational fluid dynamics (CFD) outputs with high precision at different flame radiuses and time instants with a maximum absolute error percentage of 5.46%. …”
-
286
Failure recovery in wireless content distribution networks with device-to-device cooperation
Published 2017“…We present low complexity effective algorithms based on clustering and tree construction methods in order to address three different types of dynamic node behavior, namely new devices joining the network, existing devices leaving the network, and existing devices moving locally within the network. …”
Get full text
Get full text
Get full text
Get full text
article -
287
Optimized 3D Deployment of UAV-Mounted Cloudlets to Support Latency-Sensitive Services in IoT Networks
Published 2019“…We formulate the problem as a mixed integer program, and propose an efficient meta-heuristic solution based on the ions motion optimization algorithm. …”
Get full text
Get full text
Get full text
Get full text
article -
288
Process Mining over Unordered Event Streams
Published 2020“…Specifically, we formalize the notion of out-of-order arrival of events, where an online analysis algorithm needs to process events in an order different from their generation. …”
Get full text
Get full text
Get full text
-
289
-
290
A modified coronavirus herd immunity optimizer for capacitated vehicle routing problem
Published 2021“…Due to the complex nature of the capacitated vehicle routingproblem, metaheuristic optimization algorithms are widely used for tackling this type of challenge.Coronavirus Herd Immunity Optimizer (CHIO) is a recent metaheuristic population-based algorithm thatmimics the COVID-19 herd immunity treatment strategy. …”
Get full text
-
291
Smart non-intrusive appliance identification using a novel local power histogramming descriptor with an improved k-nearest neighbors classifier
Published 2021“…A deep evaluation of the proposed LPH-IKNN based solution is investigated under different data sets, in which the proposed scheme leads to promising performance. …”
-
292
-
293
Online Control and Optimization of Directional Drilling
Published 2020“…In this thesis, dynamic modeling of two different DSS were developed and optimized using different control and optimization techniques. …”
Get full text
masterThesis -
294
Cooperative clustering models for Vehicular ad hoc networks. (c2013)
Published 2013Get full text
Get full text
masterThesis -
295
Modeling, testing, and regression testing of web applications. (c2006)
Published 2006Get full text
Get full text
masterThesis -
296
Energy-aware adaptive compression for mobile devices. (c2009)
Published 2009Get full text
Get full text
masterThesis -
297
Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks
Published 2022“…This study proposes an analytical method based on sequential quadratic programming (SQP) methodology coupled with a mean value analysis (MVA) algorithm to solve this NP-Hard problem. …”
-
298
Isolating Physical Replacement of Identical IoT Devices Using Machine and Deep Learning Approaches
Published 2021Get full text
doctoralThesis -
299
-
300
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
Published 2022“…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. In this paper, we proposed a novel technique in steganography within the digital images such is RGB, Gray Scale, Texture, Aerial images to achieve higher security, imperceptibility, capacity, and robustness as compared with existing methods. …”