Search alternatives:
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
finding » findings (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
finding » findings (Expand Search)
-
381
Secrecy Performance of Decode-and-Forward Based Hybrid RF/VLC Relaying Systems
Published 2019“…We develop physical layer security algorithms that mitigate eavesdropping on both RF and VLC networks based on zero-forcing beamforming techniques. …”
-
382
Defining quantitative rules for identifying influential researchers: Insights from mathematics domain
Published 2024“…The rules were developed for each parameter category using the Decision Tree Algorithm, which achieved an average accuracy of 70 to 75 percent for identifying awardees in mathematics domains. …”
-
383
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
Published 2023“…<p dir="ltr">The process of using robotic technology to examine underwater systems is still a difficult undertaking because the majority of automated activities lack network connectivity. …”
-
384
Autopilot Design and Commercial Autopilot Evaluation Using Flybarless Helicopter
Published 2014Get full text
doctoralThesis -
385
-
386
-
387
Enhancement of SAR Speckle Denoising Using the Improved Iterative Filter
Published 2020“…Simulated, airborne (ESAR, Oberpfaffenhofen Germany) and spaceborne (Sentinel 1, Palm Jumeirah Dubai UAE) SAR data were used to assess the filtering performances of the studied filters.…”
Get full text
article -
388
FPGA-Based Network Traffic Classification Using Machine Learning
Published 2020“…The proposed design achieves an average throughput of 163.24 Gbps, exceeding throughputs of reported hardware-based classifiers that use comparable approaches, which in turn ensures the continuity of realtime traffic classification at congested data centers.…”
Get full text
article -
389
Extreme Early Image Recognition Using Event-Based Vision
Published 2023“…<p dir="ltr">While deep learning algorithms have advanced to a great extent, they are all designed for frame-based imagers that capture images at a high frame rate, which leads to a high storage requirement, heavy computations, and very high power consumption. …”
-
390
A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis
Published 2021“…Specifically, we used a clustering algorithm to group published articles based on the similarity of their abstracts to identify research hotspots and current research directions. …”
-
391
Efficient XML Structural Similarity Detection using Sub-tree Commonalities
Published 2007“…Various algorithms for comparing hierarchically structured data, e.g. …”
Get full text
Get full text
conferenceObject -
392
-
393
A simulated annealing-based optimal controller for a three phase induction motor
Published 2002“…This paper presents a new approach for optimal controller design of a three-phase induction motor (IM), based on using the simulated annealing (SA) method to find the optimal controller gains that satisfy a specific performance criterion. …”
Get full text
Get full text
article -
394
Boosting the visibility of services in microservice architecture
Published 2023“…In this research, we evaluate the performance of several classification algorithms for estimating the quality of microservices using the QWS dataset containing traffic data of 2505 microservices. …”
-
395
-
396
Wearable Real-Time Heart Attack Detection and Warning System to Reduce Road Accidents
Published 2019“…It was observed that the linear classification algorithm was not able to detect heart attack in noisy data, whereas the support vector machine (SVM) algorithm with polynomial kernel with extended time–frequency features using extended modified B-distribution (EMBD) showed highest accuracy and was able to detect 97.4% and 96.3% of ST-elevation myocardial infarction (STEMI) and non-ST-elevation MI (NSTEMI), respectively. …”
-
397
Localization of Damages in Plain And Riveted Aluminium Specimens using Lamb Waves
Published 2018“…The TOA data of the wave reflected from the damage is used in the two arrival time difference and astroid algorithms to locate the damage in an enclosed area. …”
Get full text
-
398
Information reconciliation through agent controlled graph model. (c2018)
Published 2018“…Multiple models have been proposed and different techniques and data structures were used. Our approach provides a damage assessment and recovery algorithm that is based on agents and graphs.…”
Get full text
Get full text
Get full text
masterThesis -
399
Optimum Track to Track Fusion Using CMA-ES and LSTM Techniques
Published 2024“…The sensors are unbiased radars with fixed locations. The first method uses an offline technique based on a global optimizer called the CMA-ES algorithm and the second one uses LSTM in its different forms to learn the online adjustment of the fusion weights between the two tracks. …”
Get full text
-
400
Analysis of Using Machine Learning to Enhance the Efficiency of Facilities Management in the UAE
Published 2022“…This study addresses these issues by Implementing Machine Learning (ML) algorithms using data from Building Management Systems (BMS) and FM maintenance reports, focussing on predictive maintenance for Fresh Air Handling Units. …”
Get full text