Search alternatives:
system algorithm » swarm algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
level using » level fusion (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
system algorithm » swarm algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
level using » level fusion (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
-
181
3D GEOSTATISTICAL MODELING OF FACIES AND PETROPHYSICAL PROPERTIES OF THE UPPER KHARTAM OUTCROP OF KHUFF FORMATION, CENTRAL SAUDI ARABIA
Published 2020“…In the context of 3D modelling, lithofacies within each zone was populated separately by using different geostatistical algorithm. Based on the relative sea level, the dominated lithofacies and the presence or absence of marine fauna, the studied interval was subdivided into three broad intervals. …”
Get full text
masterThesis -
182
Adaptive false discovery rate for wavelet denoising of pavement continuous deflection measurements
Published 2016“…The algorithm minimizes the classification error of features in the wavelet transform domain by adaptively selecting the level at which to control the false discovery rate. …”
Get full text
Get full text
Get full text
Get full text
article -
183
Modeling and Control of a Thermally Driven MEMS Actuator for RF Applications
Published 2017Get full text
doctoralThesis -
184
Genetic Fuzzimetric Technique (GFT)
Published 2012“…Integration of fuzzy systems with genetic algorithm has been identified by researchers as a useful technique of optimizing systems under uncertainty. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
185
Edge Caching in Fog-Based Sensor Networks through Deep Learning-Associated Quantum Computing Framework
Published 2022“…Firstly, the DL agent prioritizes caching contents via self organizing maps (SOMs) algorithm, and secondly, the prioritized contents are stored in QMM using a Two-Level Spin Quantum Phenomenon (TLSQP). …”
-
186
A novel approach for real time flows scheduling
Published 2006“…A plethora of packet-scheduling algorithms have been proposed in the literature in order to meet the stringent time constraints of real time flows at an IP router level. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
187
-
188
A novel on design and implementation of hybrid MPPT controllers for solar PV systems under various partial shading conditions
Published 2024“…Here, the conventional converter helps increase the PV source voltage from one level to another level. The proposed system is investigated by using the MATLAB/Simulink tool.…”
-
189
Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks
Published 2023“…The proposed solution was compared with three puncturing baseline reference algorithms and the performance was evaluated in terms of eMBB Sum throughput and Fairness level. …”
-
190
A comparative study of regression testing methods. (c1996)
Published 1996Get full text
Get full text
masterThesis -
191
AUTOMATIC WEINBERGER ARRAY SYNTHESIS FROM UAHPL DESCRIPTION
Published 2020“…The system also minimizes the area required by the WA by performing row compaction. An algorithm similar to that used for channel routing is employed for compaction (Hashimoto and Stevens 1971). …”
Get full text
article -
192
Mechanical perturbation control of cardiac alternans
Published 2018“…We analyze the effects of mechanical perturbation on the dynamics of amap model that couples themembrane voltage and active tension systems at the cellular level. Therefore, a two-dimensional iterative map of the heart beat-to-beat dynamics is introduced, and a stability analysis of the system of coupled maps is performed in the presence of a mechanical perturbation algorithm. …”
Get full text
article -
193
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
Published 2023“…Moreover, the Reconciliate Multi-Agent Markov Learning (RMML) based classification algorithm is used to predict the intrusion with its appropriate classes. …”
-
194
Microwave brain imaging system to detect brain tumor using metamaterial loaded stacked antenna array
Published 2022“…The antenna is comprised of metamaterial-loaded with three substrate layers, including two air gaps. One 1 × 4 MTM array element is used in the top layer and middle layer, and one 3 × 2 MTM array element is used in the bottom layer. …”
-
195
-
196
Measuring ripple effect for object-oriented programs. (c2004)
Published 2004Get full text
Get full text
masterThesis -
197
A simple approach for testing web service based applications
Published 2005“…Test cases are executed automatically using a test execution algorithm and a test framework is also presented. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
198
Blockchain-Based Decentralized Architecture for Software Version Control
Published 2023“…<p dir="ltr">Version control is an important component of configuration management, and most enterprise-level software uses different tools and technologies to manage the software version control such as CVS, Subversion, or Perforce. …”
-
199
Inception voltage of corona in bipolar ionized fields-effect oncorona power loss
Published 1996“…In this paper, an iterative finite element based algorithm is presented as a numerical tool for the solution of the bipolar ionized field around high voltage direct current (HVDC) transmission lines. …”
Get full text
Get full text
article -
200
An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation
Published 2001“…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …”
Get full text
article