Search alternatives:
experiments each » experiments approach (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
each algorithm » search algorithm (Expand Search), jaya algorithm (Expand Search)
element » elements (Expand Search)
update » updated (Expand Search)
experiments each » experiments approach (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
each algorithm » search algorithm (Expand Search), jaya algorithm (Expand Search)
element » elements (Expand Search)
update » updated (Expand Search)
-
1
Parallel Algorithms for Distinguishing Nondeterministic Finite State Machines
Published 2015Get full text
doctoralThesis -
2
-
3
Sensitivity analysis and genetic algorithm-based shear capacity model for basalt FRC one-way slabs reinforced with BFRP bars
Published 2023“…This paper aims to identify the impact of each design parameter on the shear behavior of BFRC-BFRP one-way slabs using a fractional factorial design of experiment (DOE). …”
-
4
Predicting Compression Modes and Split Decisions for HEVC Video Coding Using Machine Learning Techniques
Published 2017Get full text
doctoralThesis -
5
Large language models for code completion: A systematic literature review
Published 2024“…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …”
-
6
CFD Based Airfoil Shape Optimization for Aerodynamic Drag Reduction
Published 2012Get full text
doctoralThesis -
7
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006“…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …”
Get full text
Get full text
article -
8
Performance Analysis of Artificial Neural Networks in Forecasting Financial Time Series
Published 2013Get full text
doctoralThesis -
9
A non-convex economic load dispatch problem using chameleon swarm algorithm with roulette wheel and Levy flight methods
Published 2023“…An Enhanced Chameleon Swarm Algorithm (ECSA) by integrating roulette wheel selection and Lévy flight methods is presented to solve non-convex Economic Load Dispatch (ELD) problems. …”
Get full text
-
10
Multimodal EEG and Keystroke Dynamics Based Biometric System Using Machine Learning Algorithms
Published 2021“…A dataset was created by acquiring both keystroke dynamics and EEG signals simultaneously from 10 users. Each user participated in 500 trials at 10 different sessions (days) to replicate real-life signal variability. …”
-
11
Optimized FPGA Implementation of PWAM-Based Control of Three—Phase Nine—Level Quasi Impedance Source Inverter
Published 2019“…Since, PWAM control algorithm is more complex than PSCPWM, FPGA based implementation for PWAM control is discussed. …”
-
12
-
13
Content-Aware Adaptive Video Streaming Using Actor-Critic Deep Reinforcement Learning
Published 2024Get full text
doctoralThesis -
14
A Hybrid Deep Learning Model Using CNN and K-Mean Clustering for Energy Efficient Modelling in Mobile EdgeIoT
Published 2023“…This research proposed a hybrid model for energy-efficient cluster formation and a head selection (E-CFSA) algorithm based on convolutional neural networks (CNNs) and a modified k-mean clustering (MKM) method for MEC. …”
-
15
-
16
Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las...
Published 2020“…The functioning of the algorithm was successfully tested by carrying out extensive experiments on a real rail track in the presence of different types of surface and sub-surface defects on its head and web. …”
Get full text
-
17
Multi-Objective Task Allocation Via Multi-Agent Coalition Formation
Published 2012Get full text
doctoralThesis -
18
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …”
Get full text
-
19
On Indefinite Quadratic Optimization over the Intersection of Balls and Linear Constraints
Published 2022“…To solve e-TRS, we use the alternating direction method of multipliers approach and a branch and bound algorithm. Numerical experiments show the efficiency of the proposed approach compared to the CVX and the extended adaptive ellipsoid-based algorithm.…”
-
20
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
Published 2022“…Finally, a 3D Finite Element simulation was conducted to validate the findings and each observation resulting from the experiments. …”
Get full text