Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
ree algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search)
element ree » elementi per (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
ree algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search)
element ree » elementi per (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
-
81
Morphology for Planar Hexagonal Modular Self-Reconfigurable Robotic Systems
Published 2009Get full text
doctoralThesis -
82
Applications of fast fourier transform in the integrity evaluation of deep foundations
Published 2016“…The widespread use of drilled shafts and the large and critical nature of loads they carry make post-construction quality control a rather important aspect of inspections. …”
Get full text
Get full text
Get full text
Get full text
article -
83
Real-Time Path-Planning using Depth/INS Sensor Fusion for Localization
Published 2019Get full text
doctoralThesis -
84
Impact Of Inspection Errors On The Performance Measures Of A General: Repeat Inspection Plan
Published 2020“…The impact of the errors is studied by conducting sensitivity analysis on the errors utilizing computer software which implements an algorithm that determines the optimal parameters of the model of the plan. …”
Get full text
article -
85
Oversampling techniques for imbalanced data in regression
Published 2024“…For tabular data, we also present the Auto-Inflater neural network, utilizing an exponential loss function for Autoencoders. …”
-
86
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…The findings from this study will help implement a system that will significantly reduce fraud in the procurement sector. …”
Get full text
-
87
Scheduling and allocation in high-level synthesis using stochastic techniques
Published 2020“…Both genetic scheduling and allocation (GSA) and tabu scheduling and allocation (TSA) have been tested on various benchmarks and results obtained for data-oriented control-data flow graphs are compared with other implementations in the literature. …”
Get full text
article -
88
Efficiency Optimization of a Standalone Solar Energy System using Fuzzy Based MPPT
Published 2012Get full text
doctoralThesis -
89
-
90
Assessment of static pile design methods and non-linear analysis of pile driving
Published 2006“…Scientific advances in pile analysis have been made in recent decades but their implementation in the estimation of axial capacity has been slow. …”
Get full text
Get full text
Get full text
masterThesis -
91
-
92
-
93
-
94
Four quadrant robust quick response optimally efficient inverterfed induction motor drive
Published 1989“…The control algorithms developed are readily implementable with present-day microprocessors…”
Get full text
Get full text
article -
95
Autopilot Design and Commercial Autopilot Evaluation Using Flybarless Helicopter
Published 2014Get full text
doctoralThesis -
96
FPGA-Based Network Traffic Classification Using Machine Learning
Published 2019Get full text
doctoralThesis -
97
Starvation Problem in CPU Scheduling for Multimedia Systems
Published 2002“…In this paper, we briefly describe three of the popular multimedia scheduling algorithms. We compare and discuss how adequate each algorithm is in handling the issue of starvation. …”
Get full text
article -
98
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
Published 2021“…<p>The Internet-of-drones (IoD) environment is a layered network control architecture designed to maintain, coordinate, access, and control drones (or Unmanned Aerial vehicles UAVs) and facilitate drones' navigation services. …”
-
99
Developing an online hate classifier for multiple social media platforms
Published 2020“…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …”
-
100
Digital Image Watermarking Using Balanced Multiwavelets
Published 2006“…In this paper, a robust watermarking algorithm using balanced multiwavelet transform is proposed. …”
Get full text
article