Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
query processing » text processing (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
query processing » text processing (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
-
221
Ensemble Deep Random Vector Functional Link Neural Network for Regression
Published 2022“…The esc-edRVFL is identified as the best-performing algorithm through a comprehensive evaluation of 31 UCI datasets.…”
-
222
Optimum Track to Track Fusion Using CMA-ES and LSTM Techniques
Published 2024“…This paper presents two different methods for track-to-track fusion of drone tracks. …”
Get full text
-
223
Newton-Raphson based adaptive inverse control scheme for tracking of nonlinear dynamic plants
Published 2006“…The U-model is utilized to design an adaptive inverse controller by using a simple root-solving algorithm of Newton-Raphson. The synergy of U-model with AIC structure has provided an effective and straight forward method for adaptive tracking of nonlinear plants. …”
Get full text
Get full text
article -
224
A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem
Published 2008“…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …”
Get full text
Get full text
Get full text
article -
225
Local convexity preserving rational cubic spline curves
Published 1997“…An algorithm is presented which constructs a curve by interpolating the given data points. …”
Get full text
Get full text
article -
226
The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions
Published 2022“…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
-
227
Solar power forecasting beneath diverse weather conditions using GD and LM-artificial neural networks
Published 2023“…A case study has been done in the Peer Panjal region. The data collected for four months with various parameters have been applied randomly as input data using GD and LM type of artificial neural network compared to actual solar energy data. …”
Get full text
-
228
Intelligent route to design efficient CO<sub>2</sub> reduction electrocatalysts using ANFIS optimized by GA and PSO
Published 2022“…Accordingly, a dataset containg 258 data points was extracted from the DFT method to use in machine learning method. …”
-
229
Parallel processing
Published 2005“…Parallel algorithms, based on simulated annealing, neural networks and genetic algorithms, for mapping irregular data to multicomputers are presented and compared. …”
Get full text
Get full text
Get full text
conferenceObject -
230
Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles
Published 2000“…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …”
Get full text
Get full text
Get full text
article -
231
Dynamic adaptation for video streaming over mobile devices. (c2013)
Published 2013Get full text
Get full text
masterThesis -
232
An Improved Genghis Khan Optimizer based on Enhanced Solution Quality Strategy for Global Optimization and Feature Selection Problems
Published 2024“…It utilizes Quasi-opposite-based learning (QOBL) to enhance the best solution obtained and, consequently, the entire population. The algorithm presented aims to solve the FS problem and has been assessed using benchmark optimization problems from the CEC’2017 and CEC’2022. …”
Get full text
-
233
Cross entropy error function in neural networks
Published 2002“…To forecast gasoline consumption (GC), the ANN uses previous GC data and its determinants in a training data set. …”
Get full text
Get full text
Get full text
conferenceObject -
234
Lagrangian tracking in stochastic fields with application to an ensemble of velocity fields in the Red Sea
Published 2018“…To this end, an efficient algorithm for forward and backward tracking of passive particles in stochastic flow-fields is presented. …”
Get full text
Get full text
Get full text
Get full text
article -
235
Growing hierarchical self-organizing map for filtering intrusion detection alarms
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
236
Vibration suppression in a cantilever beam using a string-type vibration absorber
Published 2017“…The string is rigidly connected to the fixed end of the beam and through a spring and damper to a second point on the beam. The finite element method is used to model the system and a reduced order model is obtained through modal reduction performed on both the string and the beam. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
237
A geographic information system method to generate long term regional solar radiation resource maps: enhancing decision-making
Published 2024“…The availability of solar radiation throughout the country has been mapped here using ground-based measurements and satellite data. The regression-kriging algorithm and its variants are used to calibrate satellite data, through interpolation of ground solar radiation data. …”
-
238
Innovative mobile E-healthcare systems
Published 2016“…Caching is one of the key methods in distributed computing environments to improve the performance of data retrieval. To find which item in the cache can be evicted and replaced, cache replacement algorithms are used. …”
Get full text
Get full text
Get full text
Get full text
article -
239
Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations
Published 2007“…This paper presents the design and implementation of an elliptic curve cryptographic core to realize point scalar multiplication operations used for the GF(p) elliptic curve encryption/decryption and the elliptic curve digital signature algorithm (ECDSA). …”
Get full text
Get full text
article -
240
Scheduling and allocation in high-level synthesis using stochastic techniques
Published 2020“…Both genetic scheduling and allocation (GSA) and tabu scheduling and allocation (TSA) have been tested on various benchmarks and results obtained for data-oriented control-data flow graphs are compared with other implementations in the literature. …”
Get full text
article