Showing 141 - 160 results of 301 for search '(((( implementing ii algorithm ) OR ( elements method algorithm ))) OR ( neural coding algorithm ))', query time: 0.11s Refine Results
  1. 141
  2. 142

    A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study by Masurkar, Faeez

    Published 2022
    “…Further, As the quality of received signals differs at different sensing points as a result of the surface conditions of the specimen, the Self Adaptive Smart Algorithm (SASA) method was adopted to filter out the noise and accurately pinpoint the defect reflected wave packet which ultimately aids in better detection and localization. …”
    Get full text
  3. 143

    The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions by Abdulmalik Alwarafy (17984104)

    Published 2022
    “…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
  4. 144
  5. 145

    Modélisation et validation des modèles de véhicules hybrides by Mansour, Charbel

    Published 2009
    “…Une stratégie de contrôle prédictive pour le GMP THS-II est également élaborée par programmation dynamique (DP), afin d'optimiser la consommation sur une route spécifiée au lieu d'une optimisation instantanée telle la stratégie RB, et d'accélérer le temps de calcul de l'algorithme DP pour faciliter son implémentation au sein du véhicule pour des applications temps réel. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  6. 146
  7. 147
  8. 148

    Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles by Warren, Thomas

    Published 2000
    “…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …”
    Get full text
    Get full text
    Get full text
    article
  9. 149
  10. 150

    Adaptive temperature control of a reverse flow process by using reinforcement learning approach by A. Binid (22046054)

    Published 2024
    “…Additionally, a second algorithm is presented to enhance the implementability of the reinforcement learning algorithm from a practical perspective. …”
  11. 151
  12. 152
  13. 153
  14. 154

    Vibration suppression in a cantilever beam using a string-type vibration absorber by Issa, Jimmy S.

    Published 2017
    “…The string is rigidly connected to the fixed end of the beam and through a spring and damper to a second point on the beam. The finite element method is used to model the system and a reduced order model is obtained through modal reduction performed on both the string and the beam. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 155

    Optimizing clopidogrel dose response by Saab, Yolande B.

    Published 2016
    “…Conclusion The implementation of clopidogrel new algorithm has the potential to maximize the benefit of clopidogrel pharmacological therapy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  16. 156
  17. 157

    Compensation of axle-generator errors due to wheel slip and slide by Saab, Samer S.

    Published 2002
    “…In addition, a speed and acceleration observer using a Kalman filter is implemented. Experimental results using three different axle encoders aboard a freight train are provided to illustrate the performance of the proposed algorithm…”
    Get full text
    Get full text
    Get full text
    article
  18. 158
  19. 159
  20. 160

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology by Al-Hemairy, Moh'd Hussain

    Published 2010
    “…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
    Get full text