Search alternatives:
learning algorithm » learning algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data learning » deep learning (Expand Search)
systems using » system using (Expand Search)
element » elements (Expand Search)
Showing 801 - 820 results of 1,019 for search '(((( data learning algorithm ) OR ( systems using algorithm ))) OR ( element method algorithm ))*', query time: 0.12s Refine Results
  1. 801
  2. 802

    Newton-Raphson based adaptive inverse control scheme for tracking of nonlinear dynamic plants by Shafiq, M.

    Published 2006
    “…The U-model is utilized to design an adaptive inverse controller by using a simple root-solving algorithm of Newton-Raphson. The synergy of U-model with AIC structure has provided an effective and straight forward method for adaptive tracking of nonlinear plants. …”
    Get full text
    Get full text
    article
  3. 803

    Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials by Ghouti, Lahouari

    Published 1997
    “…The proposed techniques are: i) a batch-type deconvolution method using the complex bicepstrum algorithm, and ii) automatic ultrasonic defect classification system using a modular learning strategy. …”
    Get full text
    masterThesis
  4. 804

    Generic metadata representation framework for social-based event detection, description, and linkage by Abebe, Minale A.

    Published 2020
    “…SEDDaL consists of four main modules for: i) describing social media objects in a generic Metadata Representation Space Model (MRSM) consisting of three composite dimensions: temporal, spatial, and semantic, ii) evaluating the similarity between social media objects’ descriptions following MRSM, iii) detecting events from similar social media objects using an adapted unsupervised learning algorithm, where events are represented as clusters of objects in MRSM, and iv) identifying directional, metric, and topological relationships between events following MRSM’s dimensions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 805
  6. 806

    Corona power loss computation in bundled bipolar conductors by Al-Hamouz, Z.M.

    Published 2000
    “…In this paper, a finite element (FE) based algorithm devoted for the computation of the corona current and hence the corona power loss associated with bundled bipolar high voltage direct current (HVDC) conductors is presented. …”
    Get full text
    Get full text
    article
  7. 807

    CEAP by Abdel Wahab, Omar

    Published 2016
    “…We propose as well a propagation algorithm that disseminates only the final decisions (instead of the whole dataset) among clusters with the aim of reducing the overhead of either exchanging results between each set of vehicles or repeating the detection steps for the already detected malicious vehicles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  8. 808

    Deepfakes Signatures Detection in the Handcrafted Features Space by Hamadene, Assia

    Published 2023
    “…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
    Get full text
  9. 809

    Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles by Warren, Thomas

    Published 2000
    “…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …”
    Get full text
    Get full text
    Get full text
    article
  10. 810
  11. 811

    The Role of Artificial Intelligence in Decoding Speech from EEG Signals: A Scoping Review by Uzair Shah (15740699)

    Published 2022
    “…We categorized the studies based on AI techniques, such as machine learning and deep learning. The most prominent ML algorithm was a support vector machine, and the DL algorithm was a convolutional neural network. …”
  12. 812

    Multi-Model Investigation and Adaptive Estimation of the Acoustic Release of a Model Drug From Liposomes by Wadi, Ali

    Published 2019
    “…Then, the algorithm was used to process the five experimental datasets. …”
    Get full text
    article
  13. 813

    Neural network-based failure rate prediction for De Havilland Dash-8 tires by Al-Garni, Ahmed Z.

    Published 2006
    “…An artificial neural network (ANN) model for predicting the failure rate of De Havilland Dash-8 airplane tires utilizing the twolayered feed-forward back-propagation algorithm as a learning rule is developed. The inputs to the neural network are independent variables and the output is the failure rate of the tires. …”
    Get full text
    article
  14. 814
  15. 815

    Failure-Rate Prediction for De Havilland Dash-8 Tires Employing Neural-Network Technique by Al-Garni, Ahmed Z.

    Published 2006
    “…An artificial neural-network model for predicting the failure rate of De Havilland Dash-8 airplane tires utilizing the two-layered feedforward back-propagation algorithm as a learning rule is developed. The inputs to the neural network are independent variables, and the output is the failure rate of the tires. …”
    Get full text
    article
  16. 816
  17. 817
  18. 818

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates by Ratiba F. Ghachi (14152455)

    Published 2022
    “…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …”
  19. 819

    FoGMatch by Arisdakessian, Sarhad

    Published 2019
    “…However, the fact that cloud systems are often deployed in locations that are quite far from the IoT devices and the emergence of delay-critical IoT applications (e.g., health monitoring, real-time machine learning, etc.) urged the need for extending the cloud architecture to support delay-critical services. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  20. 820