Search alternatives:
learning algorithm » learning algorithms (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
presence » presented (Expand Search), present (Expand Search), presents (Expand Search)
learning algorithm » learning algorithms (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
presence » presented (Expand Search), present (Expand Search), presents (Expand Search)
-
101
Wearable wrist to finger photoplethysmogram translation through restoration using super operational neural networks based 1D-CycleGAN for enhancing cardiovascular monitoring
Published 2024“…Current signal processing techniques, and even state-of-the-art machine learning algorithms, frequently struggle to effectively restore the inherent bodily signals amidst the array of randomly generated distortions. …”
-
102
-
103
Wide area monitoring system operations in modern power grids: A median regression function-based state estimation approach towards cyber attacks
Published 2023“…A mapping function-based initial regression analysis is made to depict the margins of state estimate in the presence of data-injection. A median regression function is built on top of it while generating and evaluating the residuals. …”
-
104
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
Published 2022“…Fifth, it is also observed that the actuation and sensing position plays a crucial role in receiving the time-domain data with a sufficient SNR and the one that is easy to analyze and interpret. …”
Get full text
-
105
Recursive Parameter Identification Of A Class Of Nonlinear Systems From Noisy Measurements
Published 2020“…The model structure is made up of two linear dynamic elements separated by a nonlinear static one. The nonlinear element is assumed to be of the polynomial type with known order; The identification is based on input/output data where the output is contaminated with measurement noise. …”
Get full text
article -
106
Localization of Damages in Plain And Riveted Aluminium Specimens using Lamb Waves
Published 2018“…The TOA data of the wave reflected from the damage is used in the two arrival time difference and astroid algorithms to locate the damage in an enclosed area. …”
Get full text
-
107
Optimum Track to Track Fusion Using CMA-ES and LSTM Techniques
Published 2024“…The JPDA (Joint Probability Data Association) with fixed gating and moderate clutter is used in the case of multiple objects. …”
Get full text
-
108
A hybrid approach for XML similarity
Published 2007“…Various algorithms for comparing hierarchically structured data, e.g. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
109
Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks
Published 2023“…An optimal resource allocation scheme is proposed with two scenarios including a guaranteed fairness level and minimum data rate among eMBB users. In addition, a knapsack-inspired punctured resource allocation algorithm is proposed where the users’ channel qualities of both services are considered at each time slot leading to the most suitable Resource Block (RB) selection for puncturing in a way that minimizes the negative impact on eMBB performance. …”
-
110
Improving INS/GPS Integration for Mobile Robotics Applications
Published 2008Get full text
doctoralThesis -
111
On the complexity of multi-parameterized cluster editing
Published 2017“…In other words, Cluster Editing can be solved efficiently when the number of false positives/negatives per single data element is expected to be small compared to the minimum cluster size. …”
Get full text
Get full text
Get full text
Get full text
article -
112
-
113
COMPUTER AIDED PROGRAMMING EDUCATION (CAPE)
Published 2020“…CAPE consists of problem definition and algorithm construction modules. Algorithm construction module is currently supported with a facility to map an algorithm(s) into FORTRAN or Pascal code. …”
Get full text
article -
114
ARDENT: A Proactive Agent-Based Routing Protocol for Internet of Vehicles
Published 2023“…The design of an efficient routing algorithm for the Internet of Vehicles (IoV) poses several problems due to its special characteristics, including nodes high-speed mobility, frequent topology change, link instability, and the presence of radio obstacles. …”
Get full text
Get full text
Get full text
Get full text
article -
115
Agent-Based Reactive Geographic Routing Protocol for Internet of Vehicles
Published 2023“…The design of an efficient routing algorithm for Internet of Vehicles (IoV) is a challenging research issue due to the inherent characteristics of IoV network, such as high-speed mobility of nodes, frequent topology change, link instability, and the presence of radio obstacles. …”
Get full text
Get full text
Get full text
Get full text
article -
116
Prediction of Multiple Clinical Complications in Cancer Patients to Ensure Hospital Preparedness and Improved Cancer Care
Published 2022“…Hence, for predicting three critical clinical complications, such as sepsis, the presence of multidrug-resistant organisms, and mortality, from the data available from medical records, we used 1166 febrile neutropenia episodes reported in 513 patients. …”
-
117
Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model
Published 2024“…The proposed approach of DDN is trained with proper data sequences used for communication and the training phase is conducted with the norms of numerous channel variants. …”
-
118
-
119
CEAP
Published 2016“…We propose as well a propagation algorithm that disseminates only the final decisions (instead of the whole dataset) among clusters with the aim of reducing the overhead of either exchanging results between each set of vehicles or repeating the detection steps for the already detected malicious vehicles. …”
Get full text
Get full text
Get full text
Get full text
article -
120
Single-Cell Transcriptome Analysis Highlights a Role for Neutrophils and Inflammatory Macrophages in the Pathogenesis of Severe COVID-19
Published 2020“…Taken together, our data reveal the presence of neutrophils and macrophage cluster-1 as the main immune cell subsets associated with severe COVID-19 and identify their inflammatory and chemotactic gene signatures, also partially reflected systemically in the circulation, for possible diagnostic and therapeutic interventions.…”