بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
-
341
-
342
Single channel speech denoising by DDPG reinforcement learning agent
منشور في 2025"…These masks are then applied to the complex STFT matrix of the noisy speech to obtain the denoised speech. For matched testing data, the proposed system offers an improvement of 1.55 points in the perceptual evaluation of speech quality (PESQ) over the unprocessed speech, the highest among the other recent state-of-the-art models used for comparison in this paper. …"
-
343
-
344
-
345
Localization of Damages in Plain And Riveted Aluminium Specimens using Lamb Waves
منشور في 2018"…The TOA data of the wave reflected from the damage is used in the two arrival time difference and astroid algorithms to locate the damage in an enclosed area. …"
احصل على النص الكامل
-
346
Assigning proctors to exams using scatter search. (c2006)
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
masterThesis -
347
Bridge Structural Health Monitoring Using Mobile Sensor Networks
منشور في 2022احصل على النص الكامل
doctoralThesis -
348
Soft Sensor for NOx Emission using Dynamical Neural Network
منشور في 2020"…Principal Component Analysis (PCA) is used to reduce number of input variables. Lag space for the model is found by using genetic algorithm to find the best time delayed model. …"
احصل على النص الكامل
article -
349
-
350
A heuristics for HTTP traffic identification in measuring user dissimilarity
منشور في 2020"…The study utilizes HTTP request method of GET filtering, to develop a heuristic algorithm to identify user-initiated requests. …"
-
351
Scheduling and allocation in high-level synthesis using stochastic techniques
منشور في 2020"…In this work, a unique approach to scheduling and allocation problem using the genetic algorithm (GA) is described. This approach is different from a previous attempt using GA (Wehn et al., IFIP Working Conference on Logic and Architecture Synthesis, Paris, 1990, pp. 47–56) in many respects. …"
احصل على النص الكامل
article -
352
RFID localization using single reader antenna. (c2014)
منشور في 2016"…Our scheme is based on Power Map Matching algorithm. The proposed method employs the use of a Single Stationary Reader Antenna and multitags placed on the asset. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
353
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
منشور في 2020"…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …"
-
354
Improving the Resilience of Smart Distribution Networks against Cyber Attacks
منشور في 2022احصل على النص الكامل
doctoralThesis -
355
-
356
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
منشور في 2023"…<p dir="ltr">The process of using robotic technology to examine underwater systems is still a difficult undertaking because the majority of automated activities lack network connectivity. …"
-
357
Autopilot Design and Commercial Autopilot Evaluation Using Flybarless Helicopter
منشور في 2014احصل على النص الكامل
doctoralThesis -
358
-
359
-
360
Enhancement of SAR Speckle Denoising Using the Improved Iterative Filter
منشور في 2020"…Simulated, airborne (ESAR, Oberpfaffenhofen Germany) and spaceborne (Sentinel 1, Palm Jumeirah Dubai UAE) SAR data were used to assess the filtering performances of the studied filters.…"
احصل على النص الكامل
article