Search alternatives:
processing algorithm » processing algorithms (Expand Search)
maya algorithm » jaya algorithm (Expand Search)
develop » developed (Expand Search)
element » elements (Expand Search)
processing algorithm » processing algorithms (Expand Search)
maya algorithm » jaya algorithm (Expand Search)
develop » developed (Expand Search)
element » elements (Expand Search)
-
81
Applications of artificial intelligence in ultrasound imaging for carpal-tunnel syndrome diagnosis: a scoping review
Published 2025“…Studies were included if they focused on the application of AI in US imaging for CTS diagnosis. Editorials, expert opinions, conference papers, dataset publications, and studies that did not have a clear clinical application of the AI algorithm were excluded.…”
-
82
Metaheuristic Optimization‐Based Sliding Mode Control With Modified Perturb and Observe for Controlling MPPT of a PV Interfaced Grid Connected System
Published 2025“…The novelty of this article is the development of a sliding mode MPPT controller for photovoltaic (PV) systems working in sunny and shaded. …”
-
83
Comparative Study of Control Strategies for Under Actuated Manipulator
Published 2006Get full text
doctoralThesis -
84
Salak Image Classification Method Based Deep Learning Technique Using Two Transfer Learning Models
Published 2022“…Pre-processing on the dataset is required to standardize the dataset by resizing the image into 224 * 224 pixels, convert into jpg format and augmentation. …”
Get full text
-
85
Modeling and Control of Nonlinear Systems Using Wavelet Networks
Published 2006Get full text
doctoralThesis -
86
Blockchain-Based Decentralized Architecture for Software Version Control
Published 2023“…The proof of authority (PoA) consensus algorithm will be used to approve the developer communicating modifications to the private blockchain network; the authority will only provide permission and will not be able to add, edit, or delete code files. …”
-
87
Microwave brain imaging system to detect brain tumor using metamaterial loaded stacked antenna array
Published 2022“…After that, the scattering parameters are collected, analyzed, and then processed by the Iteratively Corrected delay-multiply-and-sum algorithm to detect and reconstruct the brain tumor images. …”
-
88
-
89
-
90
Low Cost Autopilot Design Using Fuzzy Supervisory Control
Published 2005Get full text
doctoralThesis -
91
A stochastic PID controller for a class of MIMO systems
Published 2017“…The development of the proposed algorithm is based on minimising a stochastic performance index. …”
Get full text
Get full text
Get full text
Get full text
article -
92
Power System Transient Stability Assessment Based on Machine Learning Algorithms and Grid Topology
Published 2023“…In this study, the emergency control algorithms based on ensemble machine learning algorithms (XGBoost and Random Forest) were developed for a low-inertia power system. …”
Get full text
article -
93
A fuzzy basis function network for generator excitation control
Published 1997Get full text
Get full text
article -
94
-
95
An Intelligent and Low-Cost Eye-Tracking System for Motorized Wheelchair Control
Published 2020“…This paper proposes a system to aid people with motor disabilities by restoring their ability to move effectively and effortlessly without having to rely on others utilizing an eye-controlled electric wheelchair. The system input is images of the user’s eye that are processed to estimate the gaze direction and the wheelchair was moved accordingly. …”
-
96
IDENTIFICATION AND CONTROL STRATEGY APPLIED IN LOAD MANAGEMENT OF RESIDENTIAL AIR-CONDITIONERS
Published 2004“…These steps involve identifying the parameters of systems and applying the control strategies as forced duty cycles. An integrated simulation environment was developed wherein the identification and control algorithm were implemented. …”
Get full text
masterThesis -
97
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
Published 2023“…In addition, the proposed encryption algorithm utilizes two different chaotic maps. To ensure the appropriate utilization of these chaotic maps, we carry out in-depth analyses of their behavior in the context of secure communication and apply the pseudo-random sequences of chaotic maps in the proposed image encryption algorithm accordingly.…”
-
98
A Concurrency control model for multilevel secure object-oriented databases
Published 1995“…Later we identify the existence of covert channels in the traditional conflict-serializable concurrency control schedulers and provide an alternative transaction-processing algorithm that ensures both correctness and security. …”
Get full text
Get full text
Get full text
article -
99
Real-Time Selective Harmonic Mitigation Technique for Power Converters Based on the Exchange Market Algorithm
Published 2020“…<p dir="ltr">Hand-in-hand with the smart-grid paradigm development, power converters used in high-power applications are facing important challenges related to efficiency and power quality. …”
-
100
Integration of Textural and Material Information into BIM Using Spectrometry and Infrared Sensing
Published 2015Get full text
doctoralThesis