Results 41 to 50 of about 8,403 (210)

Four Algorithms on the Swapped Dragonfly

open access: yes, 2022
The Swapped Dragonfly with M routers per group and K global ports per router is denoted D3(K;M) [1]. It has n=KMM routers and is a partially populated Dragonfly. A Swapped Dragonfly with K and M restricted is studied in this paper. There are four cases.
openaire   +2 more sources

Hybridization of Chaotic Grey Wolf Optimizer and Dragonfly Algorithm for Short-Term Hydrothermal Scheduling

open access: yesIEEE Access, 2020
The short-term hydrothermal scheduling (STHS) is a complicated optimization problem, considering valve-point effect (VPE) and transmission losses, it exhibits the characteristics of nonlinearities and non-smoothness which increase the difficulty of ...
Gonggui Chen   +3 more
doaj   +1 more source

Integrated Procurement-Production Inventory Model with Two-Stage Production

open access: yesJurnal Teknik Industri, 2020
The inventory-production system concerns the effective management of the goods flows from raw materials to finished products. The Integrated Procurement-Production (IPP) system consists of many elements that must be managed effectively.
Dana Marsetiya Utama   +2 more
doaj   +1 more source

Fractional Calculus-based Modelling of Membrane Filtration [PDF]

open access: yesKemija u Industriji, 2022
The aim of this work was to model the deep bed and cake filtration process using an alternative approach based on a fractional calculus (FC). The considered experimental data in this study were extracted from published studies. The data used in FC models
Chehrazad Mesli   +5 more
doaj   +1 more source

DiBELLA: Distributed long read to long read alignment [PDF]

open access: yes, 2019
We present a parallel algorithm and scalable implementation for genome analysis, specifically the problem of finding overlaps and alignments for data from "third generation" long read sequencers [29]. While long sequences of DNA offer enormous advantages
Buluç, A   +4 more
core   +2 more sources

Detection of intruder using the improved dragonfly optimization algorithm

open access: yesIOP Conference Series: Materials Science and Engineering, 2021
Abstract Now a days, we are completely dependent on the systems and also on the internet. Most of our valuable information is stored in the system or in the cloud. So, it’s very necessary to protect our data and also our system from the outside intruders and also from the intruders already entered into our system.
Nagaraju Devarakonda   +2 more
openaire   +1 more source

Dragonfly‐Inspired Wing Design Enabled by Machine Learning and Maxwell's Reciprocal Diagrams

open access: yesAdvanced Science, 2023
This research is taking the first steps toward applying a 2D dragonfly wing skeleton in the design of an airplane wing using artificial intelligence. The work relates the 2D morphology of the structural network of dragonfly veins to a secondary graph ...
Hao Zheng   +4 more
doaj   +1 more source

An Optimized Continuous Dragonfly Algorithm Using Hill Climbing Local Search to Tackle the Low Exploitation Problem

open access: yesIEEE Access, 2022
Optimization problems are usually solved using heuristic algorithms such as swarm intelligence algorithms owing to their ability of providing near-optimal solutions in a feasible amount of time.
Bibi Aamirah Shafaa Emambocus   +2 more
doaj   +1 more source

Optimal Networks from Error Correcting Codes

open access: yes, 2013
To address growth challenges facing large Data Centers and supercomputing clusters a new construction is presented for scalable, high throughput, low latency networks.
Tomic, Ratko V.
core   +1 more source

Extreme Scale De Novo Metagenome Assembly [PDF]

open access: yes, 2018
Metagenome assembly is the process of transforming a set of short, overlapping, and potentially erroneous DNA segments from environmental samples into the accurate representation of the underlying microbiomes's genomes. State-of-the-art tools require big
Arndt, Bill   +8 more
core   +3 more sources

Home - About - Disclaimer - Privacy