Suggested Topics within your search.
Suggested Topics within your search.
-
601
Ice‐kNN‐South: A Lightweight Machine Learning Model for Antarctic Sea Ice Prediction
Published 2025-03-01“…Even during the years of minimum sea ice areas (SIAs) in 2017, 2022, 2023, and 2024, Ice‐kNN‐South accurately captures sea ice variations, maintaining monthly averaged SIA errors below 8.5% compared to satellite observations within a 30‐day lead time. …”
Get full text
Article -
602
A three-stage layer-based heuristic to solve the 3D bin-packing problem under balancing constraint
Published 2022-09-01Get full text
Article -
603
Load balancing optimization based on hybrid Heuristic-Metaheuristic techniques in cloud environment
Published 2022-03-01Get full text
Article -
604
A Variable Service Broker Routing Policy for data center selection in cloud analyst
Published 2017-07-01“…Cloud computing depends on sharing distributed computing resources to handle different services such as servers, storage and applications. …”
Get full text
Article -
605
Personal recognition using finger knuckle shape oriented features and texture analysis
Published 2016-10-01Get full text
Article -
606
-
607
-
608
-
609
A modified coronavirus herd immunity optimizer for capacitated vehicle routing problem
Published 2022-09-01Get full text
Article -
610
Source Design of Vertical III–V Nanowire Tunnel Field-Effect Transistors
Published 2024-01-01Get full text
Article -
611
-
612
An Energy-Efficient and Fault-Tolerant Convergecast Protocol in Wireless Sensor Networks
Published 2012-09-01“…This paper uses hyper-graph theory to solve these practical problems and proposes a spanning hyper-tree algorithm (SHTa) to compute the minimum transmitting power delivery paths set for WSNs convergecast. …”
Get full text
Article -
613
Leader-Follower Based Locally Rigid Formation Control
Published 2018-01-01“…The concepts of virtual parking bays and minimum distance technique (MDT) are utilized to attain prescribed orientations of the formation at the final destination. …”
Get full text
Article -
614
Direct Algorithm for Bernstein Enclosure Boundary of Polynomials
Published 2022-01-01“…To this end, we provide arithmetic operations and properties for obtaining a fast computational method of Bernstein coefficients. Furthermore, we give an algorithm for direct determination of the minimum and maximum Bernstein coefficients (enclosure boundary) in the simplicial multivariate case. …”
Get full text
Article -
615
The Domination Complexity and Related Extremal Values of Large 3D Torus
Published 2018-01-01“…The domination number γG of a graph G is the minimum size of a dominating set in G. In this paper, computer-aided approaches for obtaining bounds for domination number on torus graphs are here considered, and many new exact values and bounds are obtained.…”
Get full text
Article -
616
Constructing and analyzing algorithms of tensor operation paralleling
Published 2022-09-01“…It is assumed that the time of execution for all computing operations is same and equal to a unit of time, and data transfer between computer devices is performed instantaneously without any time consuming (it is acceptable, for example, a parallel computing systems with shared memory). …”
Get full text
Article -
617
Krein Space-Based H∞ Fault Estimation for Discrete Time-Delay Systems
Published 2014-01-01“…Firstly, the design of finite horizon H∞ fault estimation is converted into a minimum problem of certain quadratic form. Then we introduce a stochastic system in Krein space, and a sufficient and necessary condition for the minimum is derived by applying innovation analysis approach and projection theory. …”
Get full text
Article -
618
Quantifying the Return of Security Investments for Technology Startups
Published 2024-07-01Get full text
Article -
619
PyGenAlgo: A simple and powerful toolkit for genetic algorithms
Published 2025-05-01Get full text
Article -
620
Device Nimbus: An Intelligent Middleware for Smarter Services for Health and Fitness
Published 2015-08-01Get full text
Article