Search results for: ROOT FINDING ALGORITHM, PROPAGATION, WAVEGUIDES
-
Benchmarking Performance of a Hybrid Intel Xeon/Xeon Phi System for Parallel Computation of Similarity Measures Between Large Vectors
PublicationThe paper deals with parallelization of computing similarity measures between large vectors. Such computations are important components within many applications and consequently are of high importance. Rather than focusing on optimization of the algorithm itself, assuming specific measures, the paper assumes a general scheme for finding similarity measures for all pairs of vectors and investigates optimizations for scalability...
-
On possible applications of media described by fractional-order models in electromagnetic cloaking
PublicationThe purpose of this paper is to open a scientific discussion on possible applications of media described by fractional-order (FO) models (FOMs) in electromagnetic cloaking. A 2-D cloak based on active sources and the surface equivalence theorem is simulated. It employs a medium described by FOM in communication with sources cancelling the scattered field. A perfect electromagnetic active cloak is thereby demonstrated with the use...
-
Prediction of maximum tensile stress in plain-weave composite laminates with interacting holes via stacked machine learning algorithms: A comparative study
PublicationPlain weave composite is a long-lasting type of fabric composite that is stable enough when being handled. Open-hole composites have been widely used in industry, though they have weak structural performance and complex design processes. An extensive number of material/geometry parameters have been utilized for designing these composites, thereby an efficient computational tool is essential for that purpose. Different Machine Learning...
-
Memetic approach for multi-objective overtime planning in software engineering projects
PublicationSoftware projects often suffer from unplanned overtime due to uncertainty and risk incurred due to changing requirement and attempt to meet up with time-to-market of the software product. This causes stress to developers and can result in poor quality. This paper presents a memetic algorithmic approach for solving the overtime-planning problem in software development projects. The problem is formulated as a three-objective optimization...
-
An Efficient Noisy Binary Search in Graphs via Median Approximation
PublicationConsider a generalization of the classical binary search problem in linearly sorted data to the graph-theoretic setting. The goal is to design an adaptive query algorithm, called a strategy, that identifies an initially unknown target vertex in a graph by asking queries. Each query is conducted as follows: the strategy selects a vertex q and receives a reply v: if q is the target, then =, and if q is not the target, then v is a...
-
Computationally efficient two-objective optimization of compact microwave couplers through corrected domain patching
PublicationFinding an acceptable compromise between various objectives is a necessity in the design of contemporary microwave components and circuits. A primary reason is that most objectives are at least partially conflicting. For compact microwave structures, the design trade-offs are normally related to the circuit size and its electrical performance. In order to obtain comprehensive information about the best possible trade-offs, multi-objective...
-
Anisotropy and compaction gradient assessment on rammed earth specimens through sonic tomography approach
PublicationRammed earth is a traditional construction technique that has recently gained attention because of its benefits from an ecological perspective. The conservation of the existing valuable cultural heritage sites and the quality control of new constructions built with this material require the development and application of practical inspection techniques. This paper explores the application of sonic tests and sonic tomography as...
-
Optimal retrofit strategy using viscous dampers between adjacent RC and SMRFs prone to earthquake‑induced pounding
PublicationNowadays, retrofitting-damaged buildings is an important challenge for engineers. Finding the optimal placement of Viscous Dampers (VDs) between adjacent structures prone to earthquake-induced pounding can help designers to implement VDs with optimizing the cost of construction and achieving higher performance levels for both structures. In this research, the optimal placement of linear and nonlinear VDs between the 3-story, 5-story,...
-
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
PublicationCurrently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...
-
Optimization-Based Robustness Enhancement of Compact Microwave Component Designs with Response Feature Regression Surrogates
PublicationThe ability to evaluate the effects of fabrication tolerances and other types of uncertainties is a critical part of microwave design process. Improving the immunity of the device to parameter deviations is equally important, especially when the performance specifications are stringent and can barely be met even assuming a perfect manufacturing process. In the case of modern miniaturized microwave components of complex topologies,...
-
Microseismic Monitoring of Hydraulic Fracturing - Data Interpretation Methodology With an Example from Pomerania
PublicationMicroseismic monitoring is a method for localizing fractures induced by hydraulic fracturing in search for shell gas. The data is collected from an array of geophones deployed on the surface or underground. Ground vibrations are recorded and analysed for fracture location, magnitude and breakage mechanism. For successful microseismic monitoring one need a velocity model of underlying formations. The model is further tuned with...
-
Voice command recognition using hybrid genetic algorithm
PublicationAbstract: Speech recognition is a process of converting the acoustic signal into a set of words, whereas voice command recognition consists in the correct identification of voice commands, usually single words. Voice command recognition systems are widely used in the military, control systems, electronic devices, such as cellular phones, or by people with disabilities (e.g., for controlling a wheelchair or operating a computer...