Search alternatives:
testing algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
data testing » data using (Expand Search)
element » elements (Expand Search)
testing algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
data testing » data using (Expand Search)
element » elements (Expand Search)
-
161
A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem
Published 2008“…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …”
Get full text
Get full text
Get full text
article -
162
Dataset built for Arabic Sentiment Analysis
Published 2016“…Key stages of the framework takes three dimensions. We followed an Algorithm which involves Data Acquisition stage, Filtering Stage and Annotation Stage. …”
Get full text
-
163
I Will Survive: An Event-driven Conformance Checking Approach Over Process Streams
Published 2023“…This paper introduces a new approximate algorithm – I Will Survive (IWS). The algorithm utilizes the trie data structure to improve the calculation speed, while remaining memory-efficient. …”
Get full text
Get full text
Get full text
-
164
An integrated partitioning and synthesis system for dynamically reconfigurable Multi-FPGA architectures
Published 2017“…The SPARCS system accepts design specifications at the behavior level, in the form of task graphs. The system contains a temporal partitioning tool to temporally divide and schedule the tasks on the reconfigurable architecture, a spatial partitioning tool to map the tasks to individual FPGAs, and a high-level synthesis tool to synthesize efficient register-transfer level designs for each set of tasks destined to be downloaded on each FPGA. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
165
A Navigation and Control System for a Robot in Indoor/Outdoor Environments
Published 2016Get full text
doctoralThesis -
166
-
167
Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study
Published 2023“…<p dir="ltr">The use of artificial intelligence (AI) at the edge is transforming every aspect of the lives of human beings from scheduling daily activities to personalized shopping recommendations. …”
-
168
AI-based remaining useful life prediction and modelling of seawater desalination membranes
Published 2024Get full text
doctoralThesis -
169
Evacuation of a highly congested urban city
Published 2017“…A case study using real population and transportation network data was tested using the proposed methodology. The results show that the city is in grave danger due to the high population density and disproportionate network capacity.…”
Get full text
Get full text
Get full text
conferenceObject -
170
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
Published 2010“…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
Get full text
-
171
VEGAWES: variational segmentation on whole exome sequencing for copy number detection
Published 2015“…We tested this algorithm on synthetic data and 100 Glioblastoma Multiforme primary tumor samples. …”
-
172
Prediction the performance of multistage moving bed biological process using artificial neural network (ANN)
Published 2020“…The effect of surface area loading rate (SALR), organic matters (OMs), nutrients (N & P), feed flow rate (Q<sub>feed</sub>), hydraulic retention time (HRT), and internal recycle flow (IRF) on the performance of the ENR-BP to fulfil rigorous discharge limitations were evaluated. Experimental data was used to develop the appropriate architecture for the AAN using iterative steps of training and testing. …”
-
173
Communications in electronic textile systems
Published 2017“…Abstract- Electronic textiles (e-textiles) are emerging as a novel method for constructing electronic systems in wearable and large area applications. …”
Get full text
Get full text
Get full text
conferenceObject -
174
Improving INS/GPS Integration for Mobile Robotics Applications
Published 2008Get full text
doctoralThesis -
175
STEM: spatial speech separation using twin-delayed DDPG reinforcement learning and expectation maximization
Published 2025“…For stationary sources, the proposed system gives satisfactory performance in terms of quality, intelligibility, and separation speed, and generalizes well with the test data from a mismatched speech corpus. Its perceptual evaluation of speech quality (PESQ) score is 0.55 points better than a self-supervised learning (SSL) model and almost equivalent to the diffusion models at computational cost and training data which is many folds lesser than required by these algorithms. …”
-
176
Bridge Structural Health Monitoring Using Mobile Sensor Networks
Published 2022Get full text
doctoralThesis -
177
Generic DFT approach for pattern sensitive faults in word-orientedmemories
Published 1996“…A novel design for testability (DFT) strategy allows efficient built-in self-testing (BIST) of WOMs. By proper selection of the memory array tiling scheme, it is possible to implement O(n) BIST algorithms which test WOMs for various types of neighbourhood pattern sensitive faults (NPSFs). …”
Get full text
Get full text
article -
178
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
Published 2019“…These random numbers were subjected to NIST-800-22 test which is the most widely accepted statistical test suite. …”
-
179
-
180
Severity-Based Prioritized Processing of Packets with Application in VANETs
Published 2019“…Also, the proposed heuristic is tested against a non-prioritized processing algorithm that works using first come first served policy. …”