Search Results - "Sedgh Gooya, Ehsan"

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    Optimal Sizing and Energy Management of Microgrids with Vehicle-to-Grid Technology: A Critical Review and Future Trends by Ouramdane, Oussama, Elbouchikhi, Elhoussin, Amirat, Yassine, Sedgh Gooya, Ehsan

    Published in Energies (Basel) (01-07-2021)
    “…The topic of microgrids (MGs) is a fast-growing and very promising field of research in terms of energy production quality, pollution reduction and sustainable…”
    Get full text
    Journal Article
  2. 2

    Review of conventional metaheuristic techniques for resource-constrained project scheduling problem by Golab, Amir, Gooya, Ehsan Sedgh, Falou, Ayman Al, Cabon, Mikael

    “…This paper is concerned with an overview of the Resource-Constrained Project Scheduling Problem (RCPSP) and the conventional meta-heuristic solution techniques…”
    Get full text
    Journal Article
  3. 3

    Home Energy Management Considering Renewable Resources, Energy Storage, and an Electric Vehicle as a Backup by Ouramdane, Oussama, Elbouchikhi, Elhoussin, Amirat, Yassine, Le Gall, Franck, Sedgh Gooya, Ehsan

    Published in Energies (Basel) (01-04-2022)
    “…The vehicle-to-grid concept emerged very quickly after the integration of renewable energy resources because of their intermittency and to support the grid…”
    Get full text
    Journal Article
  4. 4

    A convolutional neural network for the resource-constrained project scheduling problem (RCPSP): A new approach by Golab, Amir, Gooya, Ehsan Sedgh, Falou, Ayman Al, Cabon, Mikael

    Published in Decision Science Letters (2023)
    “…All projects require a structure to meet project requirements and achieve established goals. This framework is called project management. Therefore, project…”
    Get full text
    Journal Article
  5. 5

    A multilayer feed-forward neural network (MLFNN) for the resource-constrained project scheduling problem (RCPSP) by Golab, Amir, Gooya, Ehsan Sedgh, Falou, Ayman Al, Cabon, Mikael

    Published in Decision Science Letters (2022)
    “…Project management has a fundamental role in national development, industrial development, and economic growth. Schedule management is also one of the…”
    Get full text
    Journal Article
  6. 6

    Robust and discriminating face recognition system based on a neural network and correlation techniques by SEDGH GOOYA, Ehsan, AL FALOU, Ayman, KADDAH, Wissam

    “…We explore an original strategy for building deep networks, based on stacking layers of auto-encoder [1], [2] which are trained in a supervised way to…”
    Get full text
    Conference Proceeding
  7. 7

    Review of conventional metaheuristic techniques for resource-constrained project scheduling problem by Golab, Amir, Gooya, Ehsan Sedgh, Falou, Ayman Al, Cabon, Mikael

    “…This paper is concerned with an overview of the Resource-Constrained Project Scheduling Problem (RCPSP) and the conventional meta-heuristic solution techniques…”
    Get full text
    Journal Article
  8. 8
  9. 9

    Extension of physical activity recognition with 3D CNN using encrypted multiple sensory data to federated learning based on multi-key homomorphic encryption by Pham, Chi-Hieu, Huynh-The, Thien, Sedgh-Gooya, Ehsan, El-Bouz, Marwa, Alfalou, Ayman

    “…Background and Objective: The Internet of medical things is enhancing smart healthcare services using physical wearable sensor-based devices connected to the…”
    Get full text
    Journal Article
  10. 10

    Taming the curse of dimensionality for perturbed token identification by Assainova, Olga, Rouot, Jeremy, Sedgh-Gooya, Ehsan

    “…In the context of data tokenization, we model a token as a vector of a finite dimensional metric space E and given a finite subset of E, called the token set,…”
    Get full text
    Conference Proceeding
  11. 11

    Privacy Preserving Encoder Classifier for Access Control Based on Face Recognition by El Saj, Raghida, Pham, Chi-Hieu, Gooya, Ehsan Sedgh, Alfalou, Ayman, Khalil, Mohamad

    “…Processing private data to control the access of a system by identifying users and blocking unknowns is becoming increasingly important and requires the…”
    Get full text
    Conference Proceeding