Search alternatives:
processing algorithm » processing algorithms (Expand Search)
testing algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
data testing » data using (Expand Search)
processing algorithm » processing algorithms (Expand Search)
testing algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
data testing » data using (Expand Search)
-
221
Unsupervised Deep Learning for Classification Of Bats Calls Using Acoustic Data
Published 2021Get full text
doctoralThesis -
222
STEM: spatial speech separation using twin-delayed DDPG reinforcement learning and expectation maximization
Published 2025“…For stationary sources, the proposed system gives satisfactory performance in terms of quality, intelligibility, and separation speed, and generalizes well with the test data from a mismatched speech corpus. Its perceptual evaluation of speech quality (PESQ) score is 0.55 points better than a self-supervised learning (SSL) model and almost equivalent to the diffusion models at computational cost and training data which is many folds lesser than required by these algorithms. …”
-
223
Bridge Structural Health Monitoring Using Mobile Sensor Networks
Published 2022Get full text
doctoralThesis -
224
Generic DFT approach for pattern sensitive faults in word-orientedmemories
Published 1996“…A novel design for testability (DFT) strategy allows efficient built-in self-testing (BIST) of WOMs. By proper selection of the memory array tiling scheme, it is possible to implement O(n) BIST algorithms which test WOMs for various types of neighbourhood pattern sensitive faults (NPSFs). …”
Get full text
Get full text
article -
225
DASSI: differential architecture search for splice identification from DNA sequences
Published 2022“…The demand for robust algorithms over the recent years has brought huge success in the field of Deep Learning (DL) in solving many difficult tasks in image, speech and natural language processing by automating the manual process of architecture design. …”
-
226
Newton-Raphson based adaptive inverse control scheme for tracking of nonlinear dynamic plants
Published 2006“…The U-model is utilized to design an adaptive inverse controller by using a simple root-solving algorithm of Newton-Raphson. The synergy of U-model with AIC structure has provided an effective and straight forward method for adaptive tracking of nonlinear plants. …”
Get full text
Get full text
article -
227
-
228
Severity-Based Prioritized Processing of Packets with Application in VANETs
Published 2019“…Also, the proposed heuristic is tested against a non-prioritized processing algorithm that works using first come first served policy. …”
-
229
A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem
Published 2008“…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …”
Get full text
Get full text
Get full text
article -
230
Investigating the Use of Machine Learning Models to Understand the Drugs Permeability Across Placenta
Published 2023“…<p dir="ltr">Owing to limited drug testing possibilities in pregnant population, the development of computational algorithms is crucial to predict the fate of drugs in the placental barrier; it could serve as an alternative to animal testing. …”
-
231
Geographical Area Network—Structural Health Monitoring Utility Computing Model
Published 2019“…Every gateway is routing the data to SHM-UCM servers running a geo-spatial patch health assessment and prediction algorithm. …”
-
232
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
Published 2022“…Further, As the quality of received signals differs at different sensing points as a result of the surface conditions of the specimen, the Self Adaptive Smart Algorithm (SASA) method was adopted to filter out the noise and accurately pinpoint the defect reflected wave packet which ultimately aids in better detection and localization. …”
Get full text
-
233
Integrative toxicogenomics: Advancing precision medicine and toxicology through artificial intelligence and OMICs technology
Published 2023“…As personalized medicine and toxicogenomics involve huge data processing, AI can expedite this process by providing powerful data processing, analysis, and interpretation algorithms. …”
-
234
Topology and parameter estimation in power systems through inverter-based broadband stimulations
Published 2015“…It combines and correlates various measurements in order to obtain an accurate snapshot of the power network parameters. To test its capabilities, the performance of this algorithm is evaluated on a small-scale test system.…”
Get full text
Get full text
Get full text
Get full text
article -
235
-
236
The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions
Published 2022“…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
-
237
Clustering Tweets to Discover Trending Topics about دبي (Dubai)
Published 2018“…One of these social networks is Twitter - a microblogging hub and rich environment of data. Scanning tweets online is a hard task and searching effortlessly to find intended topic from huge amount of data is also time consuming. …”
Get full text
-
238
A Blockchain Model for Secure Communications in Internet of Vehicles
Published 2021“…The simulation results demonstrated the good performance of the HPBC algorithm when implemented within the IoV environment.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
239
Real-Time Social Robot’s Responses to Undesired Interactions Between Children and their Surroundings
Published 2022“…Testing the best model with data acquired from children performing interactions with toys produced a promising performance for the shake and throw behaviours. …”
-
240
Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles
Published 2000“…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …”
Get full text
Get full text
Get full text
article