Search alternatives:
implementing based » implementing bundled (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithms » jaya algorithm (Expand Search)
element » elements (Expand Search)
implementing based » implementing bundled (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithms » jaya algorithm (Expand Search)
element » elements (Expand Search)
-
261
Integrated Energy Optimization and Stability Control Using Deep Reinforcement Learning for an All-Wheel-Drive Electric Vehicle
Published 2025“…To evaluate the generalizability of the algorithms, the agents are tested across various velocities, tire–road friction coefficients, and additional scenarios implemented in IPG CarMaker, a high-fidelity vehicle dynamics simulator. …”
-
262
Combinatorial method for bandwidth selection in wind speed kernel density estimation
Published 2019“…In this study, a non-parametric combinatorial method is implemented for obtaining an accurate non-parametric kernel density estimation (KDE)-based statistical model of wind speed, in which the selection of the bandwidth parameter is optimised concerning mean integrated absolute error (L 1 error ) between the true and hypothesised densities. …”
Get full text
-
263
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
Published 2017“…Fluid-structure interaction (FSI) modeling is adapted in these models to account for counter-interacting forces of flowing blood and deforming leaflets for most accurate results. However, implementation of this approach is difficult using custom built codes and algorithms. …”
Get full text
Get full text
Get full text
article -
264
The automation of the development of classification models and improvement of model quality using feature engineering techniques
Published 2023“…In this article, we propose a framework that combines feature engineering techniques such as data imputation, transformation, and class balancing to compare the performance of different prediction models and select the best final model based on predefined parameters. The proposed framework is extendable and configurable by adding algorithms supported by the CARET package implemented in the R programming language. …”
-
265
Optical character recognition on heterogeneous SoC for HD automatic number plate recognition system
Published 2018“…All proposed algorithms have been implemented using MATLAB as a proof of concept and the best one has been selected for hardware implementation using a heterogeneous system on chip (SoC) platform. …”
-
266
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
Published 2017“…Fluid-structure interaction (FSI) modeling is adapted in these models to account for counter-interacting forces of flowing blood and deforming leaflets for most accurate results. However, implementation of this approach is difficult using custom built codes and algorithms. …”
Get full text
Get full text
Get full text
article -
267
Using artificial bee colony to optimize software quality estimation models. (c2015)
Published 2016“…In this thesis, we propose a novel heuristic based on Artificial Bee Colony (ABC) to optimize rule-based software quality prediction models. …”
Get full text
Get full text
masterThesis -
268
Comparative Study on Arabic Text Classification: Challenges and Opportunities
Published 2022“…Based on the reviewed researches, SVM and Naive Bayes were the most widely used classifiers for Arabic text classification, while more effort is needed to develop and to implement flexible Arabic text classification methods and classifiers.…”
Get full text
-
269
Prototype project management tool (PPMT) with cocomo calibration. (c1998)
Published 1998Get full text
Get full text
masterThesis -
270
-
271
Common weaving approach in mainstream languages for software security hardening
Published 2013“…In this paper, we propose a novel aspect-oriented approach based on GIMPLE, a language-independent and a tree-based representation generated by the GNU Compiler Collection (GCC), for the systemization of application security hardening. …”
Get full text
Get full text
Get full text
article -
272
Advancing Coherent Power Grid Partitioning: A Review Embracing Machine and Deep Learning
Published 2025“…This paper provides PS researchers with a bird’s eye view of the current state of mainstream PGP implementations. Additionally, it assists stakeholders in selecting the most appropriate clustering algorithms for PGP applications.…”
-
273
Autopilot Design and Commercial Autopilot Evaluation Using Flybarless Helicopter
Published 2014Get full text
doctoralThesis -
274
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
Published 2021“…The technology stack of the proposed solution was also implemented with four algorithms and eight protocols. …”
Get full text
-
275
Four quadrant robust quick response optimally efficient inverterfed induction motor drive
Published 1989“…Simulation results with a 100-hp motor show that up to 80% savings in controllable losses are achievable at light load, and the motor can reach rated speed in just 750 ms. The control algorithms developed are readily implementable with present-day microprocessors…”
Get full text
Get full text
article -
276
Condenser capacity and hyperbolic perimeterImage 1
Published 2021“…We study the conformal capacity by using novel computational algorithms based on implementations of the fast multipole method, and analytic techniques. …”
Get full text
Get full text
Get full text
article -
277
LDSVM: Leukemia Cancer Classification Using Machine Learning
Published 2022“…This study proposes a novel method using machine learning algorithms based on microarrays of leukemia GSE9476 cells. …”
-
278
Towards Multimedia Fragmentation
Published 2006“…In this paper, we address multimedia database fragmentation by extending existing fragmentation algorithms to take into account key characteristics of multimedia objects. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
279
Using Fractional Bernoulli Wavelets for Solving Fractional Diffusion Wave Equations with Initial and Boundary Conditions
Published 2021“…To demonstrate the validity and applicability of the presented method, we offer five significant examples, including generalized Cattaneo diffusion wave and Klein–Gordon equations. The implementation of algorithms exposes high accuracy of the presented numerical method. …”
Get full text
article -
280
Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study
Published 2023“…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …”