بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
data tracking » radar tracking (توسيع البحث)
element » elements (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
data tracking » radar tracking (توسيع البحث)
element » elements (توسيع البحث)
-
341
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
منشور في 2019"…Therefore, for this paper multiple machine learning algorithms are investigated to predict system failure based on vehicle trips information as well as maintenance management historical data including preventive maintenance and corrective maintenance. …"
احصل على النص الكامل
-
342
-
343
RFID localization using single reader antenna. (c2014)
منشور في 2016"…In this work we propose a novel RFID based Localization methodology. Our scheme is based on Power Map Matching algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
344
Corona power loss computation in bundled bipolar conductors
منشور في 2000"…In this paper, a finite element (FE) based algorithm devoted for the computation of the corona current and hence the corona power loss associated with bundled bipolar high voltage direct current (HVDC) conductors is presented. …"
احصل على النص الكامل
احصل على النص الكامل
article -
345
Newton-Raphson based adaptive inverse control scheme for tracking of nonlinear dynamic plants
منشور في 2006"…The U-model is utilized to design an adaptive inverse controller by using a simple root-solving algorithm of Newton-Raphson. The synergy of U-model with AIC structure has provided an effective and straight forward method for adaptive tracking of nonlinear plants. …"
احصل على النص الكامل
احصل على النص الكامل
article -
346
Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles
منشور في 2000"…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
347
Recovery of business intelligence systems
منشور في 2018"…The efficiency of the data recovery algorithm is substantial for e-healthcare systems. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
348
Vibration suppression in a cantilever beam using a string-type vibration absorber
منشور في 2017"…The string is rigidly connected to the fixed end of the beam and through a spring and damper to a second point on the beam. The finite element method is used to model the system and a reduced order model is obtained through modal reduction performed on both the string and the beam. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
349
Scatter search for homology modeling
منشور في 2016"…However this technique suffers from poor initial target-template alignments. To improve homology based PSP, we propose a scatter search (SS) metaheuristic algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
350
MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks
منشور في 2009"…This paper introduces a message forwarding algorithm for search applications within mobile ad hoc networks that is based on the concept of selecting the nearest node from a set of designated nodes. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
351
Information warfare
منشور في 2017"…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
352
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
353
Shuffled Linear Regression with Erroneous Observations
منشور في 2019"…We propose an optimal recursive algorithm that updates the estimate from the underdetermined function that is based on that permutation-invariant constraint. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
354
Improving INS/GPS Integration for Mobile Robotics Applications
منشور في 2008احصل على النص الكامل
doctoralThesis -
355
Real-Time Path-Planning using Depth/INS Sensor Fusion for Localization
منشور في 2019احصل على النص الكامل
doctoralThesis -
356
Information Warfare
منشور في 2015"…The algorithm is based on data dependency and uses a single matrix that will be later used during recovery.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
357
Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates
منشور في 2022"…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …"
-
358
A forward-backward Kalman for the estimation of time-variant channels in OFDM
منشور في 2005"…In this paper, we propose an expectation-maximization (EM) algorithm for joint channel and data recovery. The algorithm makes use of the rich structure of the underlying communication problem-a structure induced by the data and channel constraints. …"
احصل على النص الكامل
احصل على النص الكامل
article -
359
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
-
360
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
منشور في 2010"…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
احصل على النص الكامل