بدائل البحث:
encoding algorithm » cosine algorithm (توسيع البحث)
data detection » data injection (توسيع البحث)
element » elements (توسيع البحث)
encoding algorithm » cosine algorithm (توسيع البحث)
data detection » data injection (توسيع البحث)
element » elements (توسيع البحث)
-
141
Hardware design and VLSI implementation of a byte-wise CRCgenerator chip
منشور في 1995"…These include areas such as error detection and correction in data communications, signature analysis, and mass storage devices for parallel information transfers…"
احصل على النص الكامل
احصل على النص الكامل
article -
142
An Effective Fault Diagnosis Technique for Wind Energy Conversion Systems Based on an Improved Particle Swarm Optimization
منشور في 2022"…The main idea behind the use of the PSO algorithm is to remove irrelevant features and extract only the most significant ones from raw data in order to improve the classification task using a neural networks classifier. …"
-
143
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
منشور في 2023"…Then, the Conjugate Self-Organizing Migration (CSOM) optimization algorithm is deployed to select the most relevant features to train the classifier, which also supports increased detection accuracy. …"
-
144
A novel hybrid methodology for fault diagnosis of wind energy conversion systems
منشور في 2023"…Therefore, a hybrid feature selection based diagnosis technique, that can preserve the advantages of wrapper and filter algorithms as well as RF model, is proposed. In the first phase, the neighborhood component analysis (NCA) filter algorithm is used to reduce and select only the pertinent features from the original raw data. …"
-
145
Benchmark on a large cohort for sleep-wake classification with machine learning techniques
منشور في 2019"…We propose the adoption of this publicly available large dataset, which is at least one order of magnitude larger than any other dataset, to systematically compare existing methods for the detection of sleep-wake stages, thus fostering the creation of new algorithms. …"
-
146
Downlink channel estimation for IMT-DS
منشور في 2001"…The DL channel of an IMT-DS system consists of time-multiplexed pilot and data symbols to facilitate coherent detection. To obtain channel estimates during pilot symbols, we propose a chip level adaptive channel estimation which performs better than the conventional method. …"
احصل على النص الكامل
احصل على النص الكامل
article -
147
-
148
A microscale evaluation of pavement roughness effects for asset management
منشور في 2013"…Finally, using the described technology, a pothole detection algorithm is devised to automatically map road roughness, a step towards a better asset management system.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
149
Efficient Seismic Volume Compression using the Lifting Scheme
منشور في 2000"…In addition, the lifting scheme offers: 1) a dramatic reduction of the required auxiliary memory, 2) an efficient combination with parallel rendering algorithms to perform arbitrary surface and volume rendering for interactive visualization, and 3) an easy integration in the parallel I/O seismic data loading routines. …"
احصل على النص الكامل
article -
150
Face Flow: Constrained Optical Flow Framework for Faces
منشور في 2020احصل على النص الكامل
doctoralThesis -
151
An Infrastructure-Assisted Crowdsensing Approach for On-Demand Traffic Condition Estimation
منشور في 2019"…Our approach combines the strengths of mobile crowdsensing, with the support of the mobile infrastructure, a multi-criteria algorithm for the participants' selection, and a deductive rule-based model for traffic condition estimation. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
152
A Digital DNA Sequencing Engine for Ransomware Analysis using a Machine Learning Network
منشور في 2020"…The proposed work contains three significant phases: Preprocessing and Feature Selection, DNA Sequence Generation and Ransomware Detection. In the first phase, data preprocessing and feature selection technique is applied to the collected dataset. …"
احصل على النص الكامل
-
153
Automated skills assessment in open surgery: A scoping review
منشور في 2025"…In this scoping review, we present the open surgeries and clinical settings where AI-based skill assessment has been applied, the kind of surgical data acquired for the AI-based algorithms, and the types of AI-based models used for automated skills assessment. …"
-
154
Exploratory risk prediction of type II diabetes with isolation forests and novel biomarkers
منشور في 2024"…In particular, Isolation Forest (iForest) was applied as an anomaly detection algorithm to address class imbalance. iForest was trained on the control group data to detect cases of high risk for T2DM development as outliers. …"
احصل على النص الكامل
-
155
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
منشور في 2019"…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. …"
احصل على النص الكامل
-
156
Multimodal feature fusion and ensemble learning for non-intrusive occupancy monitoring using smart meters
منشور في 2025"…In this study, we introduce the multimodal feature fusion for non-intrusive occupancy monitoring (MMF-NIOM) framework, which leverages both classical and deep machine learning algorithms to achieve state-of-the-art occupancy detection performance using smart meter data. …"
-
157
Transaction Dependency Based Approach for Database Damage Assessment Using a Matrix
منشور في 2017"…Companies are sharing vast online critical data, which exposes their databases to malicious attacks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
158
PERF solutions for distributed query optimization. (c1999)
منشور في 1999احصل على النص الكامل
احصل على النص الكامل
masterThesis -
159
-
160
A Geometric-Primitives-Based Compression Scheme for Testing Systems-on-a-Chip
منشور في 2001"…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data.…"
احصل على النص الكامل
article