Search alternatives:
using function » using fusion (Expand Search)
algorithm a » algorithm fa (Expand Search), algorithms a (Expand Search), algorithm _ (Expand Search)
a function » _ functional (Expand Search)
using function » using fusion (Expand Search)
algorithm a » algorithm fa (Expand Search), algorithms a (Expand Search), algorithm _ (Expand Search)
a function » _ functional (Expand Search)
-
221
Label dependency modeling in Multi-Label Naïve Bayes through input space expansion
Published 2024“…To accommodate the heterogeneity of the expanded input space, we refine the likelihood parameters of iMLNB using a joint density function, which is adept at handling the amalgamation of data types. …”
-
222
Determining the Factors Affecting the Boiling Heat Transfer Coefficient of Sintered Coated Porous Surfaces
Published 2021“…In this regard, two Bayesian optimization algorithms including Gaussian process regression (GPR) and gradient boosting regression trees (GBRT) are used for tuning the hyper-parameters (number of input and dense nodes, number of dense layers, activation function, batch size, Adam decay, and learning rate) of the deep neural network. …”
-
223
A hybrid neuro-fuzzy power system stabilizer for multimachine powersystems
Published 1998“…A fuzzy basis function network (FBFN) based power system stabilizer (PSS) is presented in this paper to improve power system dynamic stability. …”
Get full text
Get full text
article -
224
On Optimizing Backoff Procedure to Enhance Throughput and Fairness For Wireless LANs
Published 2006“…In this paper, we propose and evaluate a novel algorithm to enhance the backoff procedure of DCF. …”
Get full text
Get full text
article -
225
Platoon Transitional Maneuver Control System: A Review
Published 2021“…The most used control algorithms for both longitudinal and lateral control used for transitional platoon maneuvers are reviewed and the advantages and limitations of each control strategy are discussed. …”
-
226
A Dual Vibration Absorber for Vibration Suppression of Harmonically Forced Systems
Published 2022“…Then, a numerical technique based on both the genetic algorithm and the search simplex method is used to calculate the optimal system parameters. …”
Get full text
Get full text
Get full text
masterThesis -
227
A microscale evaluation of pavement roughness effects for asset management
Published 2013“…The results of the study validate the relationship between acceleration/road roughness and fuel consumption. Finally, using the described technology, a pothole detection algorithm is devised to automatically map road roughness, a step towards a better asset management system.…”
Get full text
Get full text
Get full text
article -
228
Design of a TE-pass reflection mode optical polarizer
Published 2003“…This in addition to being a TE pass reflection mode filter, the device also functions as a narrow band wavelength filter. …”
Get full text
Get full text
article -
229
A simplified sliding‐mode control method for multi‐level transformerless DVR
Published 2022“…Second, an effective method based on charging/discharging conditions of DC capacitors is proposed for balancing capacitor voltages using relevant switching state rather than combining DC voltage error with the inductor current error through a suitable weighting factor in forming the cost function. …”
-
230
A Stochastic Approach To Solving The Weight Setting Problem in OSPF Networks
Published 2007“…OSPF calculates the shortest paths from each source to all destinations using the Dijkstra’s algorithm based on the weights assigned to the links. …”
Get full text
masterThesis -
231
A novel network-based SIS framework for improved GA performance
Published 2025“…Genetic algorithms have long been used to solve complex optimization problems by mimicking natural selection processes. …”
Get full text
Get full text
Get full text
masterThesis -
232
Decision-level Gait Fusion for Human Identification at a Distance
Published 2014Get full text
doctoralThesis -
233
Large language models for code completion: A systematic literature review
Published 2024“…This is achieved by predicting subsequent tokens, such as keywords, variable names, types, function names, operators, and more. Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …”
-
234
Impact of fuzzy volume fraction on unsteady stagnation-point flow and heat transfer of a third-grade fuzzy hybrid nanofluid over a permeable shrinking/stretching sheet
Published 2024“…Also, the comparison of Al<sub>2</sub>O<sub>3</sub>/SA, Cu/SA and Al<sub>2</sub>O<sub>3</sub> +Cu/SA through the fuzzy membership functions (MFs). …”
-
235
The architecture of a highly reconfigurable RISC dataflow array processor
Published 2020“…The architectural design and VLSi implementation of a highly reconfigurable dataflow RISC processing element (PE) are presented. …”
Get full text
article -
236
Developing a Cooperative Behavior for Multi Agents System Application to Robot Soccer
Published 2007Get full text
doctoralThesis -
237
Adaptive step-size sign least mean squares
Published 2004“…A powerful adaptation scheme is used to adapt the step-size of the sign function inside the recursion of the sign algorithm. …”
Get full text
Get full text
article -
238
Development and Implementation of a Hybrid Intelligent Controller for Interior Permanent Magnet Synchronous Motor Drives
Published 2004“…At each operating condition a genetic algorithm is used to optimize the PI controller parameters in a closed-loop vector control scheme. …”
Get full text
article -
239
"A Tabu Search Approach for the Design of Variable Structure Load Frequency Controller Incorporating Model Nonlinearities"
Published 2007“…The objective function used in the optimization process guarantees enhancement of the controller performance and reduces VSC chattering. …”
Get full text
article -
240
Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature
Published 2022“…ObjectiveThe aim of this review was to establish an evidence-based consensus for the management of extremity ischemia after jellyfish envenomation. MethodsA systematic review of cases of extremity ischemia and necrosis after envenomation by marine cnidarians was performed to clarify what is and what is not known about management and outcomes, to draw conclusions about how best to manage these rare presentations, and to establish an evidence-based algorithm. …”
Get full text
Get full text
Get full text
article