Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
over algorithm » deer algorithm (Expand Search)
elements over » elementi per (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
over algorithm » deer algorithm (Expand Search)
elements over » elementi per (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
-
21
A new approach and faster exact methods for the maximum common subgraph problem
Published 2017“…This structure contains a large number of naturally-ordered cliques that are present in the association graph’s complement. A detailed analysis shows that the proposed algorithm requires O((m+1)n) time, which is a superior worst-case bound to those known for previously-analyzed algorithms in the setting of the MCS problem. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
22
Analysis of Multi-User-Based UAV System With Outdated CSI
Published 2024“…Optimization of UAV location and altitude is performed through a limited-memory Broyden-Fletcher-Goldfarb-Shanno (LBFGS) algorithm to attain minimum OP (MOP). Results illustrate optimal performance dependent on the channel correlation parameters, antenna elements, and fading conditions. …”
-
23
Efficient Seismic Volume Compression using the Lifting Scheme
Published 2000“…Finally a runlength plus a Huffman encoding are applied for binary coding of the quantized coefficients.…”
Get full text
article -
24
Developing a Cooperative Behavior for Multi Agents System Application to Robot Soccer
Published 2007Get full text
doctoralThesis -
25
Multigrid solvers in reconfigurable hardware. (c2006)
Published 2006Get full text
Get full text
masterThesis -
26
Downlink channel estimation for IMT-DS
Published 2001“…To obtain channel estimates during pilot symbols, we propose a chip level adaptive channel estimation which performs better than the conventional method. …”
Get full text
Get full text
article -
27
Measuring ripple effect for object-oriented programs. (c2004)
Published 2004Get full text
Get full text
masterThesis -
28
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…Dedicated weighting functions and various search algorithms have been developed for that purpose and will be presented here. …”
Get full text
Get full text
Get full text
Get full text
article -
29
Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model
Published 2024“…The performance level improvements are practically summarized in both the transmission and reception entities with the help of the proposed hybrid network architecture and the associated Dual Deep Network algorithm. …”
-
30
Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles
Published 2000“…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …”
Get full text
Get full text
Get full text
article -
31
Oversampling techniques for imbalanced data in regression
Published 2024“…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …”
-
32
Blockchain-Based Decentralized Architecture for Software Version Control
Published 2023“…The proof of authority (PoA) consensus algorithm will be used to approve the developer communicating modifications to the private blockchain network; the authority will only provide permission and will not be able to add, edit, or delete code files. …”
-
33
Reliability of artificial intelligence in predicting total knee arthroplasty component sizes: a systematic review
Published 2023“…</p><h3>Conclusion</h3><p dir="ltr">This study demonstrated the potential of AI as a valuable complement for planning TKA, exhibiting a satisfactory level of reliability in predicting TKA implant sizes. …”
-
34
-
35
UML-based regression testing for OO software
Published 2010“…For the second phase, we present algorithms for detecting system level changes in the interaction overview diagram. …”
Get full text
Get full text
Get full text
article -
36
Multi-Modal Emotion Aware System Based on Fusion of Speech and Brain Information
Published 2019“…Further, EEG is utilized as inner channel complementing speech for more authoritative recognition, by extracting multiple features belonging to time, frequency, and time–frequency. …”
Get full text
Get full text
-
37
The Generalization of Bidirectional Dual Active Bridge DC/DC Converter Modulation Schemes: State-of-the-Art Analysis under Triple Phase Shift Control
Published 2023“…Additionally, a generic optimization algorithm is developed to show the advantages of TPS modulation, and thus, the analysis in this paper offers a valuable insight for single-phase DAB converter designers in identifying a wide range of optimization algorithms to achieve higher efficiency under TPS modulation. …”
-
38
Assessment of Inventory and Transportation Collaboration in a Logistics Marketplace
Published 2020Get full text
doctoralThesis -
39
Small-Signal Stability Analysis and Parameters Optimization of Virtual Synchronous Generator for Low-Inertia Power System
Published 2025“…We further propose a hybrid Particle Swarm Optimization (PSO) algorithm with a multi-objective cost function to optimize VSG controller gains. …”
-
40
Dynamic multiple node failure recovery in distributed storage systems
Published 2018“…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …”
Get full text
Get full text
Get full text
Get full text
article