Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
ree algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search)
elements ree » elements _ (Expand Search), elementi per (Expand Search)
level using » level fusion (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
ree algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search)
elements ree » elements _ (Expand Search), elementi per (Expand Search)
level using » level fusion (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
-
181
Uplink channel estimation for IMT-DS system
Published 2001“…The DRCE employs an adaptive filter whose weights are adapted by using an LMS algorithm. The performance of the RAKE receiver with DRCE for an IMT-DS system is evaluated in terms of BER by simulations for pedestrian and vehicular channels…”
Get full text
Get full text
article -
182
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. The performance evaluation using standard datasets demonstrates that the proposed model provides an accuracy of up to 99.99%.…”
-
183
Deep Reinforcement Learning for Resource Constrained HLS Scheduling
Published 2022“…In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. The actions and rewards for the proposed algorithm are selected carefully to guide the agent to its objective. …”
Get full text
Get full text
Get full text
masterThesis -
184
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
Published 2019“…Two types of machine learning models namely classification and regression model were developed and implemented to predict the failure and abnormal behavior of the system. …”
Get full text
-
185
A GRASP Approach for Solving Large-Scale Electric Bus Scheduling Problems
Published 2021“…The problem is modelled using a mixed integer program (MIP) in which the charging time of an EB is pertinent to the battery’s state-of-charge level. …”
-
186
An integrated partitioning and synthesis system for dynamically reconfigurable Multi-FPGA architectures
Published 2017“…This paper presents an overview of SPARCS and the various algorithms used in the system, along with a brief description of how a JPEG-like image compression algorithm is mapped to a Multi-FPGA board using SPARCS.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
187
Severity-Based Prioritized Processing of Packets with Application in VANETs
Published 2019“…In this study, we propose a generic prioritization and resource management algorithm that can be used to prioritize processing of received packets in vehicular networks. …”
-
188
Optimal Routing Protocol in Multimedia Wireless Sensor Networks
Published 2011Get full text
doctoralThesis -
189
Regression Testing of Database Applications
Published 2002“…The Call Graph Firewall algorithm uses a firewall for the inter-procedural level. …”
Get full text
Get full text
Get full text
article -
190
Regression testing web services-based applications
Published 2006Get full text
Get full text
Get full text
Get full text
conferenceObject -
191
Assessment of static pile design methods and non-linear analysis of pile driving
Published 2006“…Scientific advances in pile analysis have been made in recent decades but their implementation in the estimation of axial capacity has been slow. …”
Get full text
Get full text
Get full text
masterThesis -
192
Improving the Resilience of Smart Distribution Networks against Cyber Attacks
Published 2022Get full text
doctoralThesis -
193
Spherical cavity-expansion forcing function in PRONTO 3D for application to penetration problems
Published 2017“…In the context of an analysis code, this approximation eliminates the need for modeling the target as well as the need for a contact algorithm. …”
Get full text
Get full text
Get full text
conferenceObject -
194
Degree-Based Network Anonymization
Published 2020“…Our model suggests a convenient privacy level for each net- work based on the standard deviation of its degrees. …”
Get full text
Get full text
Get full text
masterThesis -
195
Collision-Free Autonomous Navigation Solution for Mobile Wheeled
Published 2023Get full text
doctoralThesis -
196
Developing a Cooperative Behavior for Multi Agents System Application to Robot Soccer
Published 2007Get full text
doctoralThesis -
197
3D GEOSTATISTICAL MODELING OF FACIES AND PETROPHYSICAL PROPERTIES OF THE UPPER KHARTAM OUTCROP OF KHUFF FORMATION, CENTRAL SAUDI ARABIA
Published 2020“…In the context of 3D modelling, lithofacies within each zone was populated separately by using different geostatistical algorithm. Based on the relative sea level, the dominated lithofacies and the presence or absence of marine fauna, the studied interval was subdivided into three broad intervals. …”
Get full text
masterThesis -
198
Adaptive false discovery rate for wavelet denoising of pavement continuous deflection measurements
Published 2016“…The algorithm minimizes the classification error of features in the wavelet transform domain by adaptively selecting the level at which to control the false discovery rate. …”
Get full text
Get full text
Get full text
Get full text
article -
199
-
200
Genetic Fuzzimetric Technique (GFT)
Published 2012“…Integration of fuzzy systems with genetic algorithm has been identified by researchers as a useful technique of optimizing systems under uncertainty. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject