Results 51 to 60 of about 8,436 (210)
Four Algorithms on the Swapped Dragonfly
The Swapped Dragonfly with M routers per group and K global ports per router is denoted D3(K;M) [1]. It has n=KMM routers and is a partially populated Dragonfly. A Swapped Dragonfly with K and M restricted is studied in this paper. There are four cases.
openaire +2 more sources
The short-term hydrothermal scheduling (STHS) is a complicated optimization problem, considering valve-point effect (VPE) and transmission losses, it exhibits the characteristics of nonlinearities and non-smoothness which increase the difficulty of ...
Gonggui Chen +3 more
doaj +1 more source
Fractional Calculus-based Modelling of Membrane Filtration [PDF]
The aim of this work was to model the deep bed and cake filtration process using an alternative approach based on a fractional calculus (FC). The considered experimental data in this study were extracted from published studies. The data used in FC models
Chehrazad Mesli +5 more
doaj +1 more source
Integrated Procurement-Production Inventory Model with Two-Stage Production
The inventory-production system concerns the effective management of the goods flows from raw materials to finished products. The Integrated Procurement-Production (IPP) system consists of many elements that must be managed effectively.
Dana Marsetiya Utama +2 more
doaj +1 more source
DiBELLA: Distributed long read to long read alignment [PDF]
We present a parallel algorithm and scalable implementation for genome analysis, specifically the problem of finding overlaps and alignments for data from "third generation" long read sequencers [29]. While long sequences of DNA offer enormous advantages
Buluç, A +4 more
core +2 more sources
Detection of intruder using the improved dragonfly optimization algorithm
Abstract Now a days, we are completely dependent on the systems and also on the internet. Most of our valuable information is stored in the system or in the cloud. So, it’s very necessary to protect our data and also our system from the outside intruders and also from the intruders already entered into our system.
Nagaraju Devarakonda +2 more
openaire +1 more source
Verifiable control of a swarm of unmanned aerial vehicles [PDF]
This article considers the distributed control of a swarm of unmanned aerial vehicles (UAVs) investigating autonomous pattern formation and reconfigurability.
Bennet, D. J., McInnes, C.R.
core +1 more source
Advanced and accurate modelling of a Flapping Wing Micro Air Vehicle (FW MAV) and its control is one of the recent research topics related to the field of autonomous Unmanned Aerial Vehicles (UAVs). In this work, a four wing Natureinspired (NI) FW MAV is
Anavatti, Sreenatha G. +3 more
core +1 more source
Extreme Scale De Novo Metagenome Assembly [PDF]
Metagenome assembly is the process of transforming a set of short, overlapping, and potentially erroneous DNA segments from environmental samples into the accurate representation of the underlying microbiomes's genomes. State-of-the-art tools require big
Arndt, Bill +8 more
core +3 more sources
Dragonfly‐Inspired Wing Design Enabled by Machine Learning and Maxwell's Reciprocal Diagrams
This research is taking the first steps toward applying a 2D dragonfly wing skeleton in the design of an airplane wing using artificial intelligence. The work relates the 2D morphology of the structural network of dragonfly veins to a secondary graph ...
Hao Zheng +4 more
doaj +1 more source

