Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
systems using » system using (Expand Search)
element » elements (Expand Search)
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
systems using » system using (Expand Search)
element » elements (Expand Search)
-
861
A Novel Internal Model Control Scheme for Adaptive Tracking of Nonlinear Dynamic Plants
Published 2006“…Outer-loop, which is designed using linear control theory to improve tracking and disturbance rejection properties of the overall system. …”
Get full text
Get full text
article -
862
FAILURE RATE ANALYSIS OF BOEING 737 BRAKES EMPLOYING NEURAL NETWORK
Published 2007“…One-layered feed-forward back-propagation algorithm for artificial neural network whereas three parameters model for Weibull are used for the analysis. …”
Get full text
article -
863
Decomposition-based wind power forecasting models and their boundary issue: An in-depth review and comprehensive discussion on potential solutions
Published 2022“…However, existing studies usually utilize future data during the decomposition process and therefore cannot be appropriately employed for real-world applications, due to the inaccessibility of future data. …”
-
864
A machine learning approach for localization in cellular environments
Published 2018Get full text
Get full text
Get full text
Get full text
conferenceObject -
865
-
866
-
867
The maximum common subgraph problem
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
868
FPGA-Based Network Traffic Classification Using Machine Learning
Published 2020“…The performed experiments show that 60% of flow packets are a good compromise that ensures high performance in the least processing time. The results of the conducted experiments indicate that random forest outperforms other algorithms achieving a maximum accuracy of 98.5% and an F-score of 0.932. …”
Get full text
article -
869
Detecting and Predicting Archaeological Sites Using Remote Sensing and Machine Learning—Application to the Saruq Al-Hadid Site, Dubai, UAE
Published 2023“…An integrated approach, featuring the application of advanced image processing techniques and geospatial analysis using machine learning, was adopted to characterise the site while automating the process and investigating its applicability. …”
Get full text
-
870
Mitigating Motion Sickness in Autonomous Vehicles for Improved Passenger Comfort
Published 2024“…This approach requires equipping the passenger vehicle with an adaptive suspension system with active roll compensation. The optimal roll angle for MS mitigation is computed based on accurate sensor-fused inertial estimates using an off-the-shelf inertial navigation solution. …”
Get full text
article -
871
A modified optimal design of a vibration absorber for ground motion isolation
Published 2014“…Recently, a new vibration absorber setup was proposed where the absorber is placed between the dynamic system and its moving support. The problem was solved and design guidelines were proposed using the classical absorber design technique. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
872
Design and development of an embedded controller for roboticmanipulator
Published 1998“…Mohseni's Proposed Algorithm, MPA, has been incorporated into the embedded controller to reduce the computational efforts and to obtain a close-to-optimal control law. …”
Get full text
Get full text
article -
873
Optimized FPGA Implementation of PWAM-Based Control of Three—Phase Nine—Level Quasi Impedance Source Inverter
Published 2019“…In this paper, closed loop control of nine - level three - phase qZSI system is implemented using single FPGA control board thereby eliminating above said problems. …”
-
874
GenDE: A CRF-Based Data Extractor
Published 2020“…It verifies the site schema and extracts data from the Web pages using Conditional Random Fields (CRFs). The problem is solved by breaking down an observation sequence (a Web page) into simpler subsequences that will be labeled using CRF. …”
Get full text
Get full text
-
875
CNN and HEVC Video Coding Features for Static Video Summarization
Published 2022“…The accuracy of the proposed key-frame detection system was assessed using the positive predictive values, sensitivity, and F-scores. …”
Get full text
article -
876
Design of adaptive arrays based on element position perturbations
Published 1993“…The proposed adaptive system is used to form automatically the required nulls in the direction of arrival of the interference. …”
Get full text
Get full text
article -
877
A microscale evaluation of pavement roughness effects for asset management
Published 2013“…The results of the study validate the relationship between acceleration/road roughness and fuel consumption. Finally, using the described technology, a pothole detection algorithm is devised to automatically map road roughness, a step towards a better asset management system.…”
Get full text
Get full text
Get full text
article -
878
Information Warfare
Published 2015“…The algorithm is based on data dependency and uses a single matrix that will be later used during recovery.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
879
ARDENT: A Proactive Agent-Based Routing Protocol for Internet of Vehicles
Published 2023“…The design of an efficient routing algorithm for the Internet of Vehicles (IoV) poses several problems due to its special characteristics, including nodes high-speed mobility, frequent topology change, link instability, and the presence of radio obstacles. …”
Get full text
Get full text
Get full text
Get full text
article -
880
UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices
Published 2019“…We demonstrate the favourable characteristics of the proposed algorithms via extensive simulation results and analysis as a function of various system parameters, with benchmarking against two greedy algorithms based on distance and deadline metrics.…”
Get full text
Get full text
Get full text
Get full text
article