Results 41 to 50 of about 8,403 (210)
Four Algorithms on the Swapped Dragonfly
The Swapped Dragonfly with M routers per group and K global ports per router is denoted D3(K;M) [1]. It has n=KMM routers and is a partially populated Dragonfly. A Swapped Dragonfly with K and M restricted is studied in this paper. There are four cases.
openaire +2 more sources
The short-term hydrothermal scheduling (STHS) is a complicated optimization problem, considering valve-point effect (VPE) and transmission losses, it exhibits the characteristics of nonlinearities and non-smoothness which increase the difficulty of ...
Gonggui Chen +3 more
doaj +1 more source
Integrated Procurement-Production Inventory Model with Two-Stage Production
The inventory-production system concerns the effective management of the goods flows from raw materials to finished products. The Integrated Procurement-Production (IPP) system consists of many elements that must be managed effectively.
Dana Marsetiya Utama +2 more
doaj +1 more source
Fractional Calculus-based Modelling of Membrane Filtration [PDF]
The aim of this work was to model the deep bed and cake filtration process using an alternative approach based on a fractional calculus (FC). The considered experimental data in this study were extracted from published studies. The data used in FC models
Chehrazad Mesli +5 more
doaj +1 more source
DiBELLA: Distributed long read to long read alignment [PDF]
We present a parallel algorithm and scalable implementation for genome analysis, specifically the problem of finding overlaps and alignments for data from "third generation" long read sequencers [29]. While long sequences of DNA offer enormous advantages
Buluç, A +4 more
core +2 more sources
Detection of intruder using the improved dragonfly optimization algorithm
Abstract Now a days, we are completely dependent on the systems and also on the internet. Most of our valuable information is stored in the system or in the cloud. So, it’s very necessary to protect our data and also our system from the outside intruders and also from the intruders already entered into our system.
Nagaraju Devarakonda +2 more
openaire +1 more source
Dragonfly‐Inspired Wing Design Enabled by Machine Learning and Maxwell's Reciprocal Diagrams
This research is taking the first steps toward applying a 2D dragonfly wing skeleton in the design of an airplane wing using artificial intelligence. The work relates the 2D morphology of the structural network of dragonfly veins to a secondary graph ...
Hao Zheng +4 more
doaj +1 more source
Optimization problems are usually solved using heuristic algorithms such as swarm intelligence algorithms owing to their ability of providing near-optimal solutions in a feasible amount of time.
Bibi Aamirah Shafaa Emambocus +2 more
doaj +1 more source
Optimal Networks from Error Correcting Codes
To address growth challenges facing large Data Centers and supercomputing clusters a new construction is presented for scalable, high throughput, low latency networks.
Tomic, Ratko V.
core +1 more source
Extreme Scale De Novo Metagenome Assembly [PDF]
Metagenome assembly is the process of transforming a set of short, overlapping, and potentially erroneous DNA segments from environmental samples into the accurate representation of the underlying microbiomes's genomes. State-of-the-art tools require big
Arndt, Bill +8 more
core +3 more sources

