Search alternatives:
using algorithm » cosine algorithm (Expand Search)
deer algorithm » search algorithm (Expand Search)
element deer » elementi per (Expand Search)
using algorithm » cosine algorithm (Expand Search)
deer algorithm » search algorithm (Expand Search)
element deer » elementi per (Expand Search)
-
761
Assessment of Inventory and Transportation Collaboration in a Logistics Marketplace
Published 2020Get full text
doctoralThesis -
762
Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects
Published 2023“…Construction data management and integration are difficult. AI algorithms depend on data for training and analysis. …”
Get full text
-
763
Low-Cost Reduced Navigation System for Mobile Robot in Indoor/Outdoor Environments
Published 2020“…For the indoor environment, where GPS signals are blocked, another EKF algorithm is proposed using low cost depth sensor (Microsoft Kinect stream). …”
Get full text
article -
764
Failure recovery in wireless content distribution networks with device-to-device cooperation
Published 2017“…We present results for various network scenarios using simulations and experimental test bed to demonstrate the effectiveness of the proposed algorithms in terms of performance efficiency, computational complexity, and practical implementation feasibility.…”
Get full text
Get full text
Get full text
Get full text
article -
765
Enhanced leaf model vs. original MLC modeling in Eclipse TPS: impact on planning deliverability accuracy
Published 2026“…Treatment plans were created using the Acuros XB algorithm in both Eclipse versions. …”
-
766
Developing a Cooperative Behavior for Multi Agents System Application to Robot Soccer
Published 2007Get full text
doctoralThesis -
767
Real-Time Implementation of GPS Aided Low Cost Strapdown Inertial Navigation System
Published 2009Get full text
doctoralThesis -
768
-
769
On Equivalent Circuit Model-Based State-of-Charge Estimation for Lithium-Ion Batteries in Electric Vehicles
Published 2025“…A third-order equivalent circuit model is employed for the LIB based on electrochemical impedance spectra test results, with model parameters identified using a particle swarm optimization algorithm. …”
-
770
Impact of birth weight to placental weight ratio and other perinatal risk factors on left ventricular dimensions in newborns: a prospective cohort analysis
Published 2024“…Chi-squared and one-way analysis of variance were used to compare BW/PW groups and the best regression model was selected using a genetic and backward stepwise algorithm.…”
-
771
On scalable parallel recursive backtracking
Published 2015“…Many of these algorithms use recursive backtracking as their core solution paradigm. …”
Get full text
Get full text
Get full text
article -
772
-
773
Performance comparison of variable-stepsize IMEX SBDF methods on advection-diffusion-reaction models
Published 2025“…We develop an adaptive time-stepping and error control algorithm for VSSBDF methods up to fourth order based on a step-doubling refinement technique using estimates of the local truncation errors. …”
-
774
Performance comparison of variable-stepsize IMEX SBDF methods on advection-diffusion-reaction models
Published 2025“…We develop an adaptive time-stepping and error control algorithm for VSSBDF methods up to fourth order based on a step-doubling refinement technique using estimates of the local truncation errors. …”
-
775
Dynamic single node failure recovery in distributed storage systems
Published 2017“…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …”
Get full text
Get full text
Get full text
Get full text
article -
776
Deepfakes Signatures Detection in the Handcrafted Features Space
Published 2023“…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
Get full text
-
777
The Assessment and Allocation of Public Private Partnership Risks in the UAE
Published 2022Get full text
doctoralThesis -
778
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
Published 2021“…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…”
-
779
Machine Learning-Based Approach for EV Charging Behavior
Published 2021Get full text
doctoralThesis -
780