Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
each algorithm » search algorithm (Expand Search), jaya algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
elements rd » elements _ (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
each algorithm » search algorithm (Expand Search), jaya algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
elements rd » elements _ (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
-
61
Supervised term-category feature weighting for improved text classification
Published 2022“…Training the ANN using the gradient descent algorithm allows updating the term-category matrix until reaching convergence. …”
Get full text
Get full text
Get full text
Get full text
article -
62
An Intelligent and Low-Cost Eye-Tracking System for Motorized Wheelchair Control
Published 2020“…Different metrics to quantitatively evaluate the performance of each algorithm in terms of accuracy and latency were computed and overall comparison is presented. …”
-
63
Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model
Published 2024“…The performance level improvements are practically summarized in both the transmission and reception entities with the help of the proposed hybrid network architecture and the associated Dual Deep Network algorithm. …”
-
64
A machine learning approach for localization in cellular environments
Published 2018“…The integration takes advantage of the robust clustering ability of WKNN and implements a neural network that could estimate the position within each cluster. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
65
Applications of fast fourier transform in the integrity evaluation of deep foundations
Published 2016“…For this reason, states have implemented specific procedures to follow when performing inspections of deep foundations. …”
Get full text
Get full text
Get full text
Get full text
article -
66
Lightweight blockchain solutions: Taxonomy, research progress, and comprehensive review
Published 2023“…More precisely, we identify five areas within the “lightweight” concept, namely, blockchain architecture, device authentication, cryptography model, consensus algorithm, and storage method. We discuss the various methods employed in each “lightweight” category, highlighting existing gaps and identifying areas for improvement. …”
Get full text
Get full text
Get full text
Get full text
article -
67
-
68
Developing a framework for using face recognition in transit payment transactions
Published 2021“…The second solution is proposed based on implementing a dedicated full HD face recognition stereo camera system on top of each metro gate and integrate it with the recommended “Banking Payment Context- Account Based Ticketing System” by using the MFcoface face recognition method which results from the systematic literature review and experts’ outcomes. …”
Get full text
-
69
-
70
Platoon Transitional Maneuver Control System: A Review
Published 2021“…The most used control algorithms for both longitudinal and lateral control used for transitional platoon maneuvers are reviewed and the advantages and limitations of each control strategy are discussed. …”
-
71
Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers
Published 2023“…The OSF detection and localization algorithm is implemented based on the dynamic response difference between the physical system and its DT. …”
-
72
ANT-colony optimization-direct torque control for a doubly fed induction motor : An experimental validation
Published 2022“…The best solutions adopted in this situation are often based on optimization algorithms that generate the controller’s gains in each period where there is an internal or external perturbation, adapting the behaviors of the PID against the system’s nonlinearity. …”
-
73
-
74
Oversampling techniques for imbalanced data in regression
Published 2024“…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …”
-
75
Tailoring motivational health messages for smoking cessation using an mHealth recommender system integrated with an electronic health record: a study protocol
Published 2018“…Health recommender systems are information-filtering algorithms that can choose the most relevant health-related items—for instance, motivational messages aimed at smoking cessation—for each user based on his or her profile. …”
-
76
Assessment of static pile design methods and non-linear analysis of pile driving
Published 2006“…Scientific advances in pile analysis have been made in recent decades but their implementation in the estimation of axial capacity has been slow. …”
Get full text
Get full text
Get full text
masterThesis -
77
-
78
-
79
-
80
A novel design technique for generating building form
Published 2018“…The theoretical framework of the technique was successfully tested out and validated by implementing it over serious of examples that are categorized into three groups: examples directed to test out the proposed variables in each process, examples directed to validate the ability of whole technique to generate forms for a hypothetical project requirements and examples of scripting the mechanisms using the algorithmic editor interface and the visual programming language Grasshopper incorporated with Rhinoceros 3D software."…”
Get full text