Search alternatives:
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
element » elements (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
element » elements (Expand Search)
-
141
Recursive Parameter Identification Of A Class Of Nonlinear Systems From Noisy Measurements
Published 2020“…The model structure is made up of two linear dynamic elements separated by a nonlinear static one. The nonlinear element is assumed to be of the polynomial type with known order; The identification is based on input/output data where the output is contaminated with measurement noise. …”
Get full text
article -
142
Multi-Agent Variational Approach for Robotics: A Bio-Inspired Perspective
Published 2023“…Stochastic factors are integrated into the Aquila Optimizer to enhance the algorithm's efficiency. The architecture, called the Multi-Agent Exploration - Parameterized Aquila Optimizer (MAE-PAO), starts by using deterministic MAE to assess the cost and utility values of nearby cells encircling the agents. …”
Get full text
-
143
Parallel tabu search in a heterogeneous environment
Published 2003“…We discuss a parallel tabu search algorithm with implementation in a heterogeneous environment. …”
Get full text
Get full text
article -
144
Turbo-charging dominating set with an FPT subroutine
Published 2017Get full text
Get full text
Get full text
conferenceObject -
145
A hybrid approach for XML similarity
Published 2007“…Various algorithms for comparing hierarchically structured data, e.g. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
146
On the complexity of multi-parameterized cluster editing
Published 2017“…In other words, Cluster Editing can be solved efficiently when the number of false positives/negatives per single data element is expected to be small compared to the minimum cluster size. …”
Get full text
Get full text
Get full text
Get full text
article -
147
Multigrid solvers in reconfigurable hardware. (c2006)
Published 2006Get full text
Get full text
masterThesis -
148
A survey and comparison of wormhole routing techniques in a meshnetworks
Published 1997“…These multiprocessing systems consist of processing elements or nodes which are connected together by interconnection networks in various topologies. …”
Get full text
Get full text
article -
149
Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring
Published 2020“…However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. …”
-
150
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. The performance evaluation using standard datasets demonstrates that the proposed model provides an accuracy of up to 99.99%.…”
-
151
PERF solutions for distributed query optimization. (c1999)
Published 1999Get full text
Get full text
masterThesis -
152
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
Published 2022“…Finally, a 3D Finite Element simulation was conducted to validate the findings and each observation resulting from the experiments. …”
Get full text
-
153
Identification of the Uncertainty Structure to Estimate the Acoustic Release of Chemotherapeutics From Polymeric Micelles
Published 2017“…The results suggest that the proposed algorithm, the optimal Kalman filter, performs better than the other two in all tests performed.…”
Get full text
article -
154
Optimal Routing Protocol in Multimedia Wireless Sensor Networks
Published 2011Get full text
doctoralThesis -
155
Query acceleration in distributed database systems
Published 2001“…Programs were designed to implement both the original and the enhanced algorithms. …”
Get full text
Get full text
Get full text
article -
156
Solution of Fractional Differential Equations: Transform and Iterative Methods Approach
Published 2019Get full text
doctoralThesis -
157
Supervised term-category feature weighting for improved text classification
Published 2022“…It consists of a supervised weighting scheme defined based on a variant of the TF-ICF (Term Frequency-Inverse Category Frequency) model, embedded into three new lean classification approaches: (i) IterativeAdditive (flat), (ii) GradientDescentANN (1-layered), and (iii) FeedForwardANN (2-layered). …”
Get full text
Get full text
Get full text
Get full text
article -
158
-
159
Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique
Published 2024“…The research aims to use the elliptic-curve cryptography (ECC) encryption algorithm for storing the seed phrase online by encrypting the seed phrase and using the splitting technique to store the crypto wallet seed phrase. …”
-
160
Multigrid solvers in reconfigurable hardware
Published 2008“…Yet, most efforts fail in this respect due to many factors (time, resources) governed by software implementations. In this paper, we present a hardware implementation of the V-cycle Multigrid method for finding the solution of a 2D-Poisson equation. …”
Get full text
Get full text
Get full text
Get full text
article