Search alternatives:
processing algorithm » processing algorithms (Expand Search)
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
based models » based modeling (Expand Search)
element » elements (Expand Search)
processing algorithm » processing algorithms (Expand Search)
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
based models » based modeling (Expand Search)
element » elements (Expand Search)
-
501
Inferential sensing techniques in industrial applications
Published 0007“…Real data from a boiler plant is used to develop the model. …”
Get full text
masterThesis -
502
-
503
-
504
Sentiment Analysis for Arabic Social media Movie Reviews Using Deep Learning
Published 2022“…The two movies are Wahed Tani which translates to (someone else) and Amahom which translate to (their uncle), Three datasets were employed, and several categorization models were compared across them. Prior to performing sentiment analysis, it is necessary to prepare the data so that it may be used to train machine learning (ML) algorithms. …”
Get full text
-
505
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
Published 2023“…Pre-processing is a vital part of the data preparation process for cyberbullying detection. …”
Get full text
-
506
Competitive learning/reflected residual vector quantization for coding angiogram images
Published 2003“…Medical images need to be compressed for the purpose of storage/transmission of a large volume of medical data. Reflected residual vector quantization (RRVQ) has emerged recently as one of the computationally cheap compression algorithms. …”
Get full text
Get full text
article -
507
Localization of Damages in Plain And Riveted Aluminium Specimens using Lamb Waves
Published 2018“…The TOA data of the wave reflected from the damage is used in the two arrival time difference and astroid algorithms to locate the damage in an enclosed area. …”
Get full text
-
508
Bridge Structural Health Monitoring Using Mobile Sensor Networks
Published 2022Get full text
doctoralThesis -
509
A survey and comparison of wormhole routing techniques in a meshnetworks
Published 1997“…They consist of many processing nodes that interact by sending messages (containing both data and synchronization information) over a communication link, between nodes. …”
Get full text
Get full text
article -
510
Uplink Noma in UAV-Assisted IoT Networks
Published 2022“…The second device is then selected using a heuristic algorithm based on prioritizing devices with higher bit rate requirements and strict deadlines. …”
Get full text
Get full text
Get full text
masterThesis -
511
DASSI: differential architecture search for splice identification from DNA sequences
Published 2022“…The demand for robust algorithms over the recent years has brought huge success in the field of Deep Learning (DL) in solving many difficult tasks in image, speech and natural language processing by automating the manual process of architecture design. …”
-
512
RFID localization using single reader antenna. (c2014)
Published 2016“…Unlike conventional Power Map Matching schemes which create the map from actual measurements; the proposed Power Map is automatically generated based on a model. In this work we will justify the proposed Localization scheme analytically and provide numerical and experimental data to substantiate our methodology.…”
Get full text
Get full text
masterThesis -
513
A geographic information system method to generate long term regional solar radiation resource maps: enhancing decision-making
Published 2024“…The availability of solar radiation throughout the country has been mapped here using ground-based measurements and satellite data. The regression-kriging algorithm and its variants are used to calibrate satellite data, through interpolation of ground solar radiation data. …”
-
514
Turbo-charging dominating set with an FPT subroutine
Published 2017Get full text
Get full text
Get full text
conferenceObject -
515
PERF solutions for distributed query optimization. (c1999)
Published 1999Get full text
Get full text
masterThesis -
516
A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem
Published 2008“…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …”
Get full text
Get full text
Get full text
article -
517
Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles
Published 2000“…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …”
Get full text
Get full text
Get full text
article -
518
-
519
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
Published 2022“…Further, As the quality of received signals differs at different sensing points as a result of the surface conditions of the specimen, the Self Adaptive Smart Algorithm (SASA) method was adopted to filter out the noise and accurately pinpoint the defect reflected wave packet which ultimately aids in better detection and localization. …”
Get full text
-
520