Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
cc3d algorithm » rd algorithm (Expand Search)
main algorithm » jaya algorithm (Expand Search), cosine algorithm (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
cc3d algorithm » rd algorithm (Expand Search)
main algorithm » jaya algorithm (Expand Search), cosine algorithm (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
-
21
Color edge enhancement based fuzzy segmentation of license plates
Published 2005“…The proposed ALPR technique consists of two main modules: plate locating module and plate segmentation module. …”
Get full text
Get full text
article -
22
A novel hybrid methodology for fault diagnosis of wind energy conversion systems
Published 2023“…Feature selection pre-processing is an important step to increase the accuracy of the classification algorithm and decrease the dimensionality of a dataset. …”
-
23
Performance Analysis of Artificial Neural Networks in Forecasting Financial Time Series
Published 2013Get full text
doctoralThesis -
24
Loss Model Control for Efficiency Optimization and Advanced Sliding Mode Controllers with Chattering Attenuation for Five-Phase Induction Motor Drive
Published 2024“…<p dir="ltr">This paper proposes firstly a Second Order Sliding Mode Control (SOSMC) based on a Super Twisting Algorithm (STA) (SOSMC-STA) combined with a Direct Field-Oriented Control (DFOC) strategy of a Five-Phase Induction Motor (FPIM). …”
-
25
Towards a self-powering greenhouse using semi-transparent PV: Utilizing hybrid BESS-hydrogen energy storage system
Published 2024“…Second, by employing a comprehensive approach with the GBO algorithm, the research examines various scenarios as a multi-objective optimization problem, balancing economic considerations such as net present value (NPV) and energy dependency (ED). …”
-
26
Towards a self-powering greenhouse using semi-transparent PV: Utilizing hybrid BESS-hydrogen energy storage system
Published 2025“…Second, by employing a comprehensive approach with the GBO algorithm, the research examines various scenarios as a multi-objective optimization problem, balancing economic considerations such as net present value (NPV) and energy dependency (ED). …”
Get full text
Get full text
Get full text
article -
27
-
28
R-CONV++: uncovering privacy vulnerabilities through analytical gradient inversion attacks
Published 2025“…Building on this foundation, the second algorithm extends this analytical approach to support high-dimensional input data, substantially enhancing its utility across complex real-world datasets. …”
-
29
CEAP
Published 2016“…Nonetheless, the applicability of the current detection mechanisms in the deployed vehicular networks is hindered by two main challenges imposed by the special characteristics of VANETs. …”
Get full text
Get full text
Get full text
Get full text
article -
30
-
31
Discrimination between genuine and acted expressions using EEG signals and machine learning
Published 2019Get full text
doctoralThesis -
32
Oversampling techniques for imbalanced data in regression
Published 2024“…For tabular data, we also present the Auto-Inflater neural network, utilizing an exponential loss function for Autoencoders. …”
-
33
Optimal Routing and Scheduling in E-commerce Logistics using Crowdsourcing Strategies
Published 2017Get full text
doctoralThesis -
34
Mobile Robot Navigation in Dynamic Environments Using an Improved RRT* Approach
Published 2018Get full text
doctoralThesis -
35
Agent-Based Reactive Geographic Routing Protocol for Internet of Vehicles
Published 2023“…The design of an efficient routing algorithm for Internet of Vehicles (IoV) is a challenging research issue due to the inherent characteristics of IoV network, such as high-speed mobility of nodes, frequent topology change, link instability, and the presence of radio obstacles. …”
Get full text
Get full text
Get full text
Get full text
article -
36
Common weaving approach in mainstream languages for software security hardening
Published 2013“…In the first approach, we prove them according to the rules and algorithms provided in this paper. In the second approach, we accommodate Kniesel's discipline that ensures that security solutions specified by our approach are applied at all and only the required points in source code, taking into consideration weaving interactions and interferences. …”
Get full text
Get full text
Get full text
article -
37
Optimal Dispatch of Mobile Energy Storage Unit to Support EV Charging Stations
Published 2021Get full text
doctoralThesis -
38
Software defect prediction. (c2019)
Published 2019“…It is divided into two main tracks. One that focuses on predicting defect in software modules using a hybrid heuristic - a combination of Particle Swarm Optimization (PSO) and Genetic Algorithms (GA). …”
Get full text
Get full text
Get full text
masterThesis -
39
-
40