Search alternatives:
using algorithm » cosine algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
develop » developed (Expand Search)
element » elements (Expand Search)
using algorithm » cosine algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
develop » developed (Expand Search)
element » elements (Expand Search)
-
741
An Alternating Projection Framework for Elementwise Masked Nonlinear Matrix Decomposition
Published 2025Get full text
doctoralThesis -
742
Guidance, Control and Trajectory Tracking of Small Fixed Wing Unmanned Aerial Vehicles (UAV's)
Published 2009Get full text
doctoralThesis -
743
Anonymizing multimedia documents
Published 2016“…In this paper, we propose de-linkability, a privacy-preserving constraint to bound the amount of information outsourced that can be used to re-identify individuals. We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …”
Get full text
Get full text
Get full text
Get full text
article -
744
On the Generation of Quantified Lemmas
Published 2018“…This solution yields a sequence of lemmas and, finally, a proof based on these lemmas. Various techniques are developed to simplify the canonical solution resulting in a reduction of proof complexity. …”
-
745
Modeling and Identification of Nonlinear DC Motor Drive Systems Using Recurrent Wavelet Networks
Published 2013Get full text
doctoralThesis -
746
An Intelligent and Low-Cost Eye-Tracking System for Motorized Wheelchair Control
Published 2020“…To accomplish such a feat, four user-specific methods were developed, implemented, and tested; all of which were based on a benchmark database created by the authors. …”
-
747
Autonomous Vehicles Delivery Systems: Analyzing Vehicle Routing Problems with a Moving Depot
Published 2019Get full text
doctoralThesis -
748
Test time minimization for system-on-chip with test bus assignment and sizin
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
749
Structural similarity evaluation between XML documents and DTDs
Published 2007“…The automatic processing and management of XML-based data are ever more popular research issues due to the increasing abundant use of XML, especially on the Web. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
750
An Infrastructure-Assisted Crowdsensing Approach for On-Demand Traffic Condition Estimation
Published 2019“…However, the current solutions proposed for the use of crowdsensing for the collection of traffic related data adopt an opportunistic continuous sensing approach, which entails high resource consumption on the server and mobile device side, a high communication overhead, while offering little control of the users over the sensing activity. …”
Get full text
Get full text
Get full text
Get full text
article -
751
ARDENT: A Proactive Agent-Based Routing Protocol for Internet of Vehicles
Published 2023“…The design of an efficient routing algorithm for the Internet of Vehicles (IoV) poses several problems due to its special characteristics, including nodes high-speed mobility, frequent topology change, link instability, and the presence of radio obstacles. …”
Get full text
Get full text
Get full text
Get full text
article -
752
Artificial Intelligence–Driven Serious Games in Health Care: Scoping Review
Published 2022“…Three reviewers independently extracted data from the included studies. A narrative approach was used for data synthesis.…”
-
753
Common weaving approach in mainstream languages for software security hardening
Published 2013“…In this paper, we propose a novel aspect-oriented approach based on GIMPLE, a language-independent and a tree-based representation generated by the GNU Compiler Collection (GCC), for the systemization of application security hardening. …”
Get full text
Get full text
Get full text
article -
754
Optimal Routing and Scheduling in E-commerce Logistics using Crowdsourcing Strategies
Published 2017Get full text
doctoralThesis -
755
From Collatz Conjecture to chaos and hash function
Published 2023“…The primary goal of this research is to develop a robust and efficient chaos-based hash function that addresses the requirements of cryptographic systems. …”
-
756
Modeling and Control of a Thermally Driven MEMS Actuator for RF Applications
Published 2017Get full text
doctoralThesis -
757
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…Dedicated weighting functions and various search algorithms have been developed for that purpose and will be presented here. …”
Get full text
Get full text
Get full text
Get full text
article -
758
Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements
Published 2023“…An original MHFE-based formulation of the two-phase flow model is taken as a reference for the development of the BCPR preconditioner, in which the set of system unknowns comprises both element and face pressures, in addition to the cell saturations, resulting in a $$3\times 3$$ 3 × 3 block-structured Jacobian matrix with a $$2\times 2$$ 2 × 2 inner pressure problem. …”
-
759
Modeling and Control of Nonlinear Systems Using Wavelet Networks
Published 2006Get full text
doctoralThesis -
760