Search alternatives:
method algorithm » mould algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
implementing ii » implementing iot (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
implementing ii » implementing iot (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
-
141
-
142
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
Published 2022“…Further, As the quality of received signals differs at different sensing points as a result of the surface conditions of the specimen, the Self Adaptive Smart Algorithm (SASA) method was adopted to filter out the noise and accurately pinpoint the defect reflected wave packet which ultimately aids in better detection and localization. …”
Get full text
-
143
The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions
Published 2022“…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
-
144
-
145
Modélisation et validation des modèles de véhicules hybrides
Published 2009“…Une stratégie de contrôle prédictive pour le GMP THS-II est également élaborée par programmation dynamique (DP), afin d'optimiser la consommation sur une route spécifiée au lieu d'une optimisation instantanée telle la stratégie RB, et d'accélérer le temps de calcul de l'algorithme DP pour faciliter son implémentation au sein du véhicule pour des applications temps réel. …”
Get full text
Get full text
Get full text
masterThesis -
146
Modeling of magnetization curves for computer-aided design
Published 1993Get full text
Get full text
article -
147
-
148
Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles
Published 2000“…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …”
Get full text
Get full text
Get full text
article -
149
An efficient method for the open-shop scheduling problem using simulated annealing
Published 2016Get full text
Get full text
Get full text
Get full text
conferenceObject -
150
Adaptive temperature control of a reverse flow process by using reinforcement learning approach
Published 2024“…Additionally, a second algorithm is presented to enhance the implementability of the reinforcement learning algorithm from a practical perspective. …”
-
151
Morphology for Planar Hexagonal Modular Self-Reconfigurable Robotic Systems
Published 2009Get full text
doctoralThesis -
152
-
153
-
154
Vibration suppression in a cantilever beam using a string-type vibration absorber
Published 2017“…The string is rigidly connected to the fixed end of the beam and through a spring and damper to a second point on the beam. The finite element method is used to model the system and a reduced order model is obtained through modal reduction performed on both the string and the beam. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
155
Optimizing clopidogrel dose response
Published 2016“…Conclusion The implementation of clopidogrel new algorithm has the potential to maximize the benefit of clopidogrel pharmacological therapy. …”
Get full text
Get full text
Get full text
Get full text
article -
156
A method for data path synthesis using neural networks
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
157
Compensation of axle-generator errors due to wheel slip and slide
Published 2002“…In addition, a speed and acceleration observer using a Kalman filter is implemented. Experimental results using three different axle encoders aboard a freight train are provided to illustrate the performance of the proposed algorithm…”
Get full text
Get full text
Get full text
article -
158
-
159
Turbo-charging dominating set with an FPT subroutine
Published 2017Get full text
Get full text
Get full text
conferenceObject -
160
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
Published 2010“…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
Get full text