-
281
Design of adaptive arrays based on element position perturbations
منشور في 1993"…The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …"
احصل على النص الكامل
احصل على النص الكامل
article -
282
Convergence and steady-state analysis of the normalized least mean fourth algorithm
منشور في 2007"…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …"
article -
283
Convergence and steady-state analysis of the normalized least mean fourth algorithm
منشور في 2007"…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …"
احصل على النص الكامل
article -
284
Incorporation of Robust Sliding Mode Control and Adaptive Multi-Layer Neural Network-Based Observer for Unmanned Aerial Vehicles
منشور في 2024"…The MLNN observer, employing a modified back-propagation algorithm, is used for the quadrotor’s state estimation. …"
-
285
-
286
A Genetic Algorithm for Improving Accuracy of Software Quality Predictive Models
منشور في 2010"…In this work, we present a genetic algorithm to optimize predictive models used to estimate software quality characteristics. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
287
Novel Peak Detection Algorithms for Pileup Minimization in Gamma Ray Spectroscopy
منشور في 2006"…This study uses the above facility in developing algorithms for digitally determining the basic pulse parameters and tackling the problem of pulse pile-up in Gamma-ray spectroscopy. …"
احصل على النص الكامل
احصل على النص الكامل
article -
288
A parallel optimization algorithm for the maximum clique problem. (c2008)
منشور في 2008احصل على النص الكامل
احصل على النص الكامل
masterThesis -
289
Efficient heuristic algorithms for influence propagation in social networks. (c2018)
منشور في 2018"…Then we introduce the notion of an influence propagation function and use it to design an efficient algorithm across all types of networks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
290
Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms
منشور في 2022"…The outcomes revealed that these ML algorithms can be useful in predicting ground losses during wild blueberry harvesting in the selected fields.…"
-
291
Evolutionary algorithms, simulated annealing and tabu search: a comparative study
منشور في 2020"…The termevolutionary algorithmis used to refer to any probabilistic algorithmwhose design is inspired by evolutionary mechanisms found in biological species. …"
احصل على النص الكامل
article -
292
A novel design technique for generating building form
منشور في 2018"…The theoretical framework of the technique was successfully tested out and validated by implementing it over serious of examples that are categorized into three groups: examples directed to test out the proposed variables in each process, examples directed to validate the ability of whole technique to generate forms for a hypothetical project requirements and examples of scripting the mechanisms using the algorithmic editor interface and the visual programming language Grasshopper incorporated with Rhinoceros 3D software."…"
احصل على النص الكامل
-
293
Design and analysis of efficient and secure elliptic curve cryptoprocessors.
منشور في 2006"…Elliptic Curve Cryptosystems have attracted many researchers and have been included in many standards such as IEEE, ANSI, NIST, SEC and WTLS. The ability to use smaller keys and computationally more efficient algorithms compared with earlier public key cryptosystems such as RSA and ElGamal are two main reasons why elliptic curve cryptosystems are becoming more popular. …"
احصل على النص الكامل
masterThesis -
294
Framework for rapid design and optimisation of immersive battery cooling system
منشور في 2025"…Two key parameters are optimised, namely: battery gap spacing (3–10 mm) and inlet/outlet width (5–15 mm), via Optimal Latin Hypercube Sampling, Support Vector Regression, and GDE3 algorithm. Palm biodiesel is used as a dielectric coolant in the proposed system to preserve LIB temperature within 20–40°C, preventing thermal runaway and ensuring a lightweight BTMS design. …"
-
295
-
296
A new tabu search algorithm for the long-term hydro scheduling problem
منشور في 2002"…The algorithm is based on using the short-term memory of the tabu search (TS) approach to solve the nonlinear optimization problem in continuous variables of the LTHSP. …"
احصل على النص الكامل
احصل على النص الكامل
article -
297
Wearable wrist to finger photoplethysmogram translation through restoration using super operational neural networks based 1D-CycleGAN for enhancing cardiovascular monitoring
منشور في 2024"…TTR-GAN comprises cascaded dual-stage 1D Cycle Generative Adversarial Networks (1D-CycleGANs) constructed using Super-ONNs. In the first phase, corrupted wPPG waveforms are blindly restored using a 1D-CycleGAN-based restoration framework. …"
-
298
UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks
منشور في 2018"…To this end, we propose the utilization of Unmanned Aerial Vehicles (UAVs) to collect data in dense wireless sensor networks (WSNs) using projection-based Compressive Data Gathering (CDG) as a novel solution methodology. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
299
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
منشور في 2024"…Moreover, the DBRF classification model is deployed to categorize the normal and attacking data flows using optimized features. Here, the proposed DRF-DBRF security model's performance is validated and tested using five different and popular IoT benchmarking datasets. …"
-
300
LaScaDa: A Novel Scalable Topology for Data Center Network
منشور في 2020"…LaScaDa forwards packets between nodes using a new hierarchical row-based routing algorithm. …"