Search alternatives:
using algorithm » cosine algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
elements rd » elements _ (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
using algorithm » cosine algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
elements rd » elements _ (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
-
261
Microwave brain imaging system to detect brain tumor using metamaterial loaded stacked antenna array
Published 2022“…Later, a nine-antenna array-based microwave brain imaging (MBI) system is implemented and investigated by using phantom model. …”
-
262
Finite volume central schemes for three-dimensional ideal MHD
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
263
Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements
Published 2023“…Therefore, we designed a dedicated two-stage strategy, inspired by the CPR algorithm, where a block preconditioner is used for the pressure part with the aim at exploiting the inner $$2\times 2$$ 2 × 2 structure. …”
-
264
DRL-Based UAV Path Planning for Coverage Hole Avoidance: Energy Consumption and Outage Time Minimization Trade-Offs
Published 2025“…We show that for a typical point on the cell, there is a trade-off between minimizing the maximum outage time length and consumed mechanical energy. …”
-
265
Just-in-time defect prediction for mobile applications: using shallow or deep learning?
Published 2023“…Traditional machine learning-based defect prediction models have been built since the early 2000s, and recently, deep learning-based models have been designed and implemented. …”
-
266
-
267
-
268
Integrated Energy Optimization and Stability Control Using Deep Reinforcement Learning for an All-Wheel-Drive Electric Vehicle
Published 2025“…To evaluate the generalizability of the algorithms, the agents are tested across various velocities, tire–road friction coefficients, and additional scenarios implemented in IPG CarMaker, a high-fidelity vehicle dynamics simulator. …”
-
269
Combinatorial method for bandwidth selection in wind speed kernel density estimation
Published 2019“…In this study, a non-parametric combinatorial method is implemented for obtaining an accurate non-parametric kernel density estimation (KDE)-based statistical model of wind speed, in which the selection of the bandwidth parameter is optimised concerning mean integrated absolute error (L 1 error ) between the true and hypothesised densities. …”
Get full text
-
270
An aspect-oriented framework for systematic security hardening of software
Published 2008“…We also explore the viability of the proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the result of explanatory case studies. …”
Get full text
Get full text
Get full text
masterThesis -
271
The automation of the development of classification models and improvement of model quality using feature engineering techniques
Published 2023“…In this article, we propose a framework that combines feature engineering techniques such as data imputation, transformation, and class balancing to compare the performance of different prediction models and select the best final model based on predefined parameters. The proposed framework is extendable and configurable by adding algorithms supported by the CARET package implemented in the R programming language. …”
-
272
Optical character recognition on heterogeneous SoC for HD automatic number plate recognition system
Published 2018“…All proposed algorithms have been implemented using MATLAB as a proof of concept and the best one has been selected for hardware implementation using a heterogeneous system on chip (SoC) platform. …”
-
273
Using artificial bee colony to optimize software quality estimation models. (c2015)
Published 2016“…In this thesis, we propose a novel heuristic based on Artificial Bee Colony (ABC) to optimize rule-based software quality prediction models. …”
Get full text
Get full text
masterThesis -
274
Prototype project management tool (PPMT) with cocomo calibration. (c1998)
Published 1998Get full text
Get full text
masterThesis -
275
-
276
Common weaving approach in mainstream languages for software security hardening
Published 2013“…In this paper, we propose a novel aspect-oriented approach based on GIMPLE, a language-independent and a tree-based representation generated by the GNU Compiler Collection (GCC), for the systemization of application security hardening. …”
Get full text
Get full text
Get full text
article -
277
Advancing Coherent Power Grid Partitioning: A Review Embracing Machine and Deep Learning
Published 2025“…This paper provides PS researchers with a bird’s eye view of the current state of mainstream PGP implementations. Additionally, it assists stakeholders in selecting the most appropriate clustering algorithms for PGP applications.…”
-
278
Autopilot Design and Commercial Autopilot Evaluation Using Flybarless Helicopter
Published 2014Get full text
doctoralThesis -
279
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
Published 2021“…The technology stack of the proposed solution was also implemented with four algorithms and eight protocols. …”
Get full text
-
280
Four quadrant robust quick response optimally efficient inverterfed induction motor drive
Published 1989“…Simulation results with a 100-hp motor show that up to 80% savings in controllable losses are achievable at light load, and the motor can reach rated speed in just 750 ms. The control algorithms developed are readily implementable with present-day microprocessors…”
Get full text
Get full text
article