Search alternatives:
processing algorithm » processing algorithms (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
processing algorithm » processing algorithms (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
-
541
A Biologicaly Inspired Decision Model for Multivariable Genetic- Fuzzy-AHP System
Published 2016“…This paper describes a hybridized intelligent algorithm as a tuning mechanism for one type of Genetic Fuzzy system termed the Genetic Fuzzimetric Technique (GFT). …”
Get full text
Get full text
Get full text
Get full text
article -
542
Recursive Parameter Identification Of A Class Of Nonlinear Systems From Noisy Measurements
Published 2020“…The model structure is made up of two linear dynamic elements separated by a nonlinear static one. …”
Get full text
article -
543
-
544
-
545
A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem
Published 2008“…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …”
Get full text
Get full text
Get full text
article -
546
Corona power loss computation in bundled bipolar conductors
Published 2000“…In this paper, a finite element (FE) based algorithm devoted for the computation of the corona current and hence the corona power loss associated with bundled bipolar high voltage direct current (HVDC) conductors is presented. …”
Get full text
Get full text
article -
547
Graph contraction for physical optimization methods
Published 1993“…We then present experimental results on using contracted graphs as inputs to two physical optimization methods; namely, Genetic Algorithm and Simulated Annealing. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
548
Scan Test Cost and Power Reduction Through Systematic Scan Reconfiguration
Published 0000“…Using SAS, this paper also presents systematic scan reconfiguration, a test data compression algorithm that is applied to achieve 10times to 40 times compression ratios without requiring any information from the automatic-test-pattern-generation tool about the unspecified bits. …”
Get full text
Get full text
article -
549
Identification of errors-in-variables model with observation outliers based on Minimum-Covariance-Determinant
Published 2007“…In order to solve the MCD problem for the EIV model we propose a random search algorithm. The proposed algorithm has been applied to a heat exchanger data.…”
Get full text
Get full text
article -
550
MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks
Published 2009“…The goal of the proposed algorithm is to minimize the average number of hops taken to reach the node that holds the desired data. …”
Get full text
Get full text
Get full text
Get full text
article -
551
Scatter search metaheuristic for homology based protein structure prediction. (c2015)
Published 2015“…We assess our algorithm on a total of 11 proteins whose structures are present in the Protein Data Bank (PDB) and which has been used in previous literature. …”
Get full text
Get full text
masterThesis -
552
Newton-Raphson based adaptive inverse control scheme for tracking of nonlinear dynamic plants
Published 2006“…The U-model is utilized to design an adaptive inverse controller by using a simple root-solving algorithm of Newton-Raphson. …”
Get full text
Get full text
article -
553
An Effective Fault Diagnosis Technique for Wind Energy Conversion Systems Based on an Improved Particle Swarm Optimization
Published 2022“…The main idea behind the use of the PSO algorithm is to remove irrelevant features and extract only the most significant ones from raw data in order to improve the classification task using a neural networks classifier. …”
-
554
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
Published 2010“…Accordingly security threats and data banks attacks turn out to be a phenomenon. Thus, granting protection to such crucial information becomes a high demand. …”
Get full text
-
555
Communications in electronic textile systems
Published 2017“…This paper studies the communication requirements between the computing and sensing elements of an e-textile. This communication is studied through the construction of a prototype as well as through modeling and simulation. …”
Get full text
Get full text
Get full text
conferenceObject -
556
-
557
Benchmarking Concept Drift Detectors for Online Machine Learning
Published 2022“…The main task is to detect changes in data distribution that might cause changes in the decision bound aries for a classification algorithm. …”
Get full text
Get full text
Get full text
-
558
Clustering Tweets to Discover Trending Topics about دبي (Dubai)
Published 2018“…Then, creating a word vector to the tweets by using TF-IDF methodology. After this, log results into k- mean clustering algorithm with cosine similarity to measure similarity between objects of each cluster. …”
Get full text
-
559
CEAP
Published 2016“…The first challenge is related to the highly mobile nature of vehicles that complicates the processes of monitoring, buffering, and analyzing observations on these vehicles as they are continuously moving and changing their locations. …”
Get full text
Get full text
Get full text
Get full text
article -
560
DASSI: differential architecture search for splice identification from DNA sequences
Published 2022“…<h2>Background</h2> <p>The data explosion caused by unprecedented advancements in the field of genomics is constantly challenging the conventional methods used in the interpretation of the human genome. …”