Search alternatives:
generation optimization » migration optimization (Expand Search)
Showing 181 - 196 results of 196 for search 'generation optimization algorithm', query time: 0.05s Refine Results
  1. 181

    Investigating the Impact of Skylights and Atrium Configurations on Visual Comfort and Daylight Performance in Dubai Shopping Malls by SANAD, AYMAN ADEL AHMED

    Published 2025
    “…Annual simulations are used to assess seasonal variations, while sensitivity analysis identifies key parameters. A genetic algorithm and multi-objective optimisation (MOO) simulations are used to generate optimal configurations, summarised in the form of a Pareto front selection criteria guide the choice of the optimum solution, which is then applied and analysed in a case study. …”
    Get full text
  2. 182

    Scatter search technique for exam timetabling by Mansour, Nashat

    Published 2011
    “…We evaluate our suggested technique on real-world university data and compare our results with the registrar’s manual timetable in addition to the timetables of other heuristic optimization algorithms. The experimental results show that our adapted scatter search technique generates better timetables than those produced by the registrar, manually, and by other meta-heuristics.…”
    Get full text
    Get full text
    Get full text
    article
  3. 183

    Estimation of power grid topology parameters through pilot signals by Hargossian, H.

    Published 2016
    “…The proposed topology estimation method relies on injected pilot signals through generators feeding in power. Pilot voltage stimulations are injected from distributed generators and the induced currents effects are measured at several nodes in the system. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  4. 184

    Advancing Coherent Power Grid Partitioning: A Review Embracing Machine and Deep Learning by Mohamed Massaoudi (16888710)

    Published 2025
    “…There is an increased emphasis on immunizing renewable-dominated power systems from large-scale cascading failures and cyberattacks through optimal power grid partitioning (PGP). By altering the network’s topology, partitioning aims to create areas within the PS that are not only robust but also have increased flexibility in generation and improved controllability over variable demand. …”
  5. 185

    Practical single node failure recovery using fractional repetition codes in data centers by Itani, May

    Published 2016
    “…The contribution of this work is three fold: We generate an optimized block distribution schema that minimizes the total system repair cost in a data center and we present a full recovery plan for the system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  6. 186

    Development of a deep learning-based group contribution framework for targeted design of ionic liquids by Sadah Mohammed (18192859)

    Published 2024
    “…Correlation results align with the experimental data, affirming the applicability of our framework. Finally, the algorithm is employed in a CO<sub>2</sub> capture case study to generate and select the best-performing novel ILs, which exhibit behavior consistent with established ILs in the literature.…”
  7. 187

    Privacy-Preserving Fog Aggregation of Smart Grid Data Using Dynamic Differentially-Private Data Perturbation by Fawaz Kserawi (16904859)

    Published 2022
    “…Our model utilizes fog-computing data aggregation with lightweight cryptographic primitives to ensure the authenticity and confidentiality of data generated by low-end devices. We describe our differentially-private model with flexible constraints and a dynamic window algorithm to maintain the privacy-budget loss in infinitely generated time-series data. …”
  8. 188

    3D deployment of UAVs in wireless networks for traffic offloading and edge computing. (c2019) by Islambouli, Rania

    Published 2019
    “…To optimally deploy UAVs as mounted cloudlets, we formulate our problem as mixed integer program and then use an e cient meta-heuristic algorithm to generate optimized results for large scale IoT networks. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  9. 189
  10. 190

    Practical Multiple Node Failure Recovery in Distributed Storage Systems by Itani, M.

    Published 2016
    “…Fast convergence validates the efficacy of our algorithms for different system parameters. Simulation results are shown to be close to optimal for the case of newly arriving blocks.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  11. 191

    Dynamic multiple node failure recovery in distributed storage systems by Itani, May

    Published 2018
    “…We present a range of results for our proposed algorithms in several scenarios to assess the effectiveness of the solution approaches that are shown to generate results close to optimal.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  12. 192

    On the complexity of bilinear computations by Takche, Jean Halim

    Published 1984
    “…One can show that we can restrict ourselves to bilinear algorithms. Brockett and Dobkin showed that the problem is equivalent to minimizing the number of rank one matrices that generate a given set of matrices. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  13. 193

    A Data-Driven Decision-Making Framework for Fleet Management in the Government Sector of Dubai by ALGHANEM, HANI SUBHI MOHD

    Published 2024
    “…My research aims to develop a data-driven decision support framework for fleet management, focusing on leveraging advanced algorithms, including decision trees and random forests, to generate domain-specific AI models. …”
    Get full text
  14. 194

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
  15. 195
  16. 196

    Deep and transfer learning for building occupancy detection: A review and comparative analysis by Aya Nabil Sayed (17317006)

    Published 2022
    “…Moreover, the paper conducted a comparative study of the readily available algorithms for occupancy detection to determine the optimal method in regards to training time and testing accuracy. …”