Search alternatives:
processing algorithm » processing algorithms (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
test processing » text processing (Expand Search), melt processing (Expand Search)
ipca algorithm » jaya algorithm (Expand Search)
processing algorithm » processing algorithms (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
test processing » text processing (Expand Search), melt processing (Expand Search)
ipca algorithm » jaya algorithm (Expand Search)
-
81
-
82
Developing a Cooperative Behavior for Multi Agents System Application to Robot Soccer
Published 2007Get full text
doctoralThesis -
83
Loop based scheduling for high level synthesis
Published 1995“…This paper describes a new loop based scheduling algorithm. The algorithm aims at reducing the runtime processing complexity of path based scheduling techniques. …”
Get full text
Get full text
article -
84
Wavelet Analysis- Singular Value Decomposition Based Method for Precise Fault Localization in Power Distribution Networks Using k-NN Classifier
Published 2025“…Additionally, the computational efficiency of the algorithm is evidenced by an average processing time of 0.0764 seconds per fault event, making it well-suited for real-time applications.…”
-
85
Fast Transient Stability Assessment of Power Systems Using Optimized Temporal Convolutional Networks
Published 2024“…The proposed algorithm is evaluated on the 68-bus system and the Northeastern United States 25k-bus synthetic test system with credible contingencies using the PowerWorld simulator. …”
-
86
Bridge Structural Health Monitoring Using Mobile Sensor Networks
Published 2022Get full text
doctoralThesis -
87
Design of A Theoretical Framework For A Real-Time Fire Evacuation Guidance System
Published 2020Get full text
doctoralThesis -
88
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
89
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
Published 2019“…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …”
-
90
Topology and parameter estimation in power systems through inverter-based broadband stimulations
Published 2015“…It combines and correlates various measurements in order to obtain an accurate snapshot of the power network parameters. To test its capabilities, the performance of this algorithm is evaluated on a small-scale test system.…”
Get full text
Get full text
Get full text
Get full text
article -
91
Full-fledged semantic indexing and querying model designed for seamless integration in legacy RDBMS
Published 2018“…We have conducted a battery of experiments to test the performance of SemIndex, evaluating its construction time, storage size, query processing time, and result quality, in comparison with legacy inverted index. …”
Get full text
Get full text
Get full text
Get full text
article -
92
Estimating Vehicle State by GPS/IMU Fusion with Vehicle Dynamics
Published 2013Get full text
doctoralThesis -
93
Morphology for Planar Hexagonal Modular Self-Reconfigurable Robotic Systems
Published 2009Get full text
doctoralThesis -
94
-
95
-
96
Real-Time Smart-Digital Stethoscope System for Heart Diseases Monitoring
Published 2019“…The hyper parameter optimization, along with and without a feature reduction method, was tested to improve accuracy. The cost-adjusted optimized ensemble algorithm can produce 97% and 88% accuracy of classifying abnormal and normal HS, respectively.…”
-
97
A PLC based power factor controller for a 3-phase induction motor
Published 2000“…Details of the experimental setup and test results in addition to the recommendations are also demonstrated…”
Get full text
Get full text
article -
98
Supervised term-category feature weighting for improved text classification
Published 2022“…Text classification is a central task in Natural Language Processing (NLP) that aims at categorizing text documents into predefined classes or categories. …”
Get full text
Get full text
Get full text
Get full text
article -
99
Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning
Published 2023“…Manually annotated data from a corpus collection was used to label the information for deep learning purposes. Pre-processing is a vital part of the data preparation process for cyberbullying detection. …”
Get full text
-
100