Search alternatives:
algorithm within » algorithm its (Expand Search)
using function » using fusion (Expand Search)
algorithm goa » algorithm fa (Expand Search), algorithm _ (Expand Search), algorithms a (Expand Search)
algorithm within » algorithm its (Expand Search)
using function » using fusion (Expand Search)
algorithm goa » algorithm fa (Expand Search), algorithm _ (Expand Search), algorithms a (Expand Search)
-
241
Data-driven robust model predictive control for greenhouse temperature control and energy utilisation assessment
Published 2023“…A robust model predictive control strategy, based on the minimax objective function and particle swarm optimisation algorithm, is developed to handle the uncertainties in the system. …”
-
242
Particle swarm optimization approach for protein structure prediction in the 3D HP model
Published 2012“…To test our algorithm, we used two sets of benchmark sequences of different lengths and compared our results to published results. …”
Get full text
Get full text
Get full text
article -
243
Regression testing web services-based applications
Published 2006Get full text
Get full text
Get full text
Get full text
conferenceObject -
244
Fixed set search applied to the multi-objective minimum weighted vertex cover problem
Published 2022“…One important characteristic of the proposed GRASP is that it avoids the use of weighted sums of objective functions in the local search and the greedy algorithm. …”
-
245
Parallel tabu search in a heterogeneous environment
Published 2003“…We discuss a parallel tabu search algorithm with implementation in a heterogeneous environment. …”
Get full text
Get full text
article -
246
Guidance, Control and Trajectory Tracking of Small Fixed Wing Unmanned Aerial Vehicles (UAV's)
Published 2009Get full text
doctoralThesis -
247
A Stochastic Approach To Solving The Weight Setting Problem in OSPF Networks
Published 2007“…OSPF calculates the shortest paths from each source to all destinations using the Dijkstra’s algorithm based on the weights assigned to the links. …”
Get full text
masterThesis -
248
AGEomics Biomarkers and Machine Learning—Realizing the Potential of Protein Glycation in Clinical Diagnostics
Published 2022“…AGEomics biomarkers have been used in diagnostic algorithms using machine learning methods. …”
-
249
Exploring New Parameters to Advance Surface Roughness Prediction in Grinding Processes for the Enhancement of Automated Machining
Published 2024“…To evaluate a robust algorithm, a method is devised that involves different networks utilizing various activation functions and neuron sizes to distinguish and select the best architecture for this study. …”
-
250
Design and development of an embedded controller for roboticmanipulator
Published 1998“…MPA is capable of determining a simplified control law by selecting the most dominant terms from a library of nonlinear functions associated with the robot's equations of motion. …”
Get full text
Get full text
article -
251
Genetic Fuzzimetric Technique (GFT)
Published 2012“…Integration of fuzzy systems with genetic algorithm has been identified by researchers as a useful technique of optimizing systems under uncertainty. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
252
New primitives to AOP weaving capabilities for security hardening concerns
Published 2007“…These primitives are called exportParameter and importParameter and are used to pass parameters between two point cuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
253
Entire hypergeometric approximants for the ground state energy perturbation series of the quartic, sextic and octic anharmonic oscillators
Published 2023“…In this work, we use appropriate hypergeometric functions to approximate a divergent series ( n! …”
-
254
A microscale evaluation of pavement roughness effects for asset management
Published 2013“…The results of the study validate the relationship between acceleration/road roughness and fuel consumption. Finally, using the described technology, a pothole detection algorithm is devised to automatically map road roughness, a step towards a better asset management system.…”
Get full text
Get full text
Get full text
article -
255
Design of adaptive arrays based on element position perturbations
Published 1993“…Arrays with different number of elements and various illumination functions were investigated. The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …”
Get full text
Get full text
article -
256
Design of a TE-pass reflection mode optical polarizer
Published 2003“…This in addition to being a TE pass reflection mode filter, the device also functions as a narrow band wavelength filter. The analysis of the filter is carried out numerically using the method of lines with a perfectly matched layer in order to absorb the radiative field. …”
Get full text
Get full text
article -
257
Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials
Published 1997“…The proposed techniques are: i) a batch-type deconvolution method using the complex bicepstrum algorithm, and ii) automatic ultrasonic defect classification system using a modular learning strategy. …”
Get full text
masterThesis -
258
Real-Time Implementation of GPS Aided Low Cost Strapdown Inertial Navigation System
Published 2009Get full text
doctoralThesis -
259
Critical exponents from the weak-coupling, strong-coupling and large-order parametrization of the hypergeometric (k+1Fk) approximants
Published 2021“…Since strong-coupling behavior is not yet known for the renormalization group functions of the O(N)-symmetric φ 4 theory, we used weak-coupling and largeorder parametrization to resum the seven-loop critical exponents ν, η and ω for N = 0, 1, 2, 3, 4. …”
-
260
Axes-Based Encryption Key
Published 2018“…This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. The approach is based on concepts: transforming data, distributing data, and XORing it with other data. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject