Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
wsd algorithm » rd algorithm (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
element » elements (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
wsd algorithm » rd algorithm (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
element » elements (Expand Search)
-
41
Recursive Parameter Identification Of A Class Of Nonlinear Systems From Noisy Measurements
Published 2020“…The model structure is made up of two linear dynamic elements separated by a nonlinear static one. …”
Get full text
article -
42
Corona power loss computation in bundled bipolar conductors
Published 2000Get full text
Get full text
article -
43
Estimating Vehicle State by GPS/IMU Fusion with Vehicle Dynamics
Published 2013Get full text
doctoralThesis -
44
Newton-Raphson based adaptive inverse control scheme for tracking of nonlinear dynamic plants
Published 2006“…Adaptive tracking of nonlinear dynamic plants is an essential element of many control applications. The main difficulty felt in establishing the tracking of nonlinear dynamic plants is the computational complexity in controller design. …”
Get full text
Get full text
article -
45
On the complexity of multi-parameterized cluster editing
Published 2017“…As a byproduct, we obtain a kernelization algorithm that delivers linear-size kernels when the two edge-edit bounds are small constants.…”
Get full text
Get full text
Get full text
Get full text
article -
46
Microwave brain imaging system to detect brain tumor using metamaterial loaded stacked antenna array
Published 2022“…The antenna is comprised of metamaterial-loaded with three substrate layers, including two air gaps. One 1 × 4 MTM array element is used in the top layer and middle layer, and one 3 × 2 MTM array element is used in the bottom layer. …”
-
47
Vibration suppression in a cantilever beam using a string-type vibration absorber
Published 2017“…The design of the vibration absorber is done in two steps. In the first, the spring stiffness, the position of the second attachment point of the string and a preliminary damping constant are calculated using a genetic algorithm approach where the objective function is the maximum displacement on the beam. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
48
Oversampling techniques for imbalanced data in regression
Published 2024“…For tabular data, we also present the Auto-Inflater neural network, utilizing an exponential loss function for Autoencoders. …”
-
49
Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates
Published 2022“…<h2>Purpose</h2> <p>We present an approach that combines finite element analysis and genetic algorithms to find the optimal configuration of local resonators created in the host structure to suppress their vibration in a target low-frequency range. …”
-
50
-
51
Autonomous Demand-Side Management in the Future Smart Grid
Published 2016Get full text
doctoralThesis -
52
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
Published 2019“…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. Experiment is performed using Azure Machine Learning (ML) platform to test and assess the most efficient model that would predict the failure of system elements and predict the abnormality of the operation. …”
Get full text
-
53
Efficient unified Montgomery inversion with multi-bit shifting
Published 2005“…They present two inversion algorithms for binary extension and prime fields, which are slightly modified versions of the Montgomery inversion algorithm. …”
Get full text
Get full text
article -
54
Multidimensional Gains for Stochastic Approximation
Published 2019“…The two algorithms assume full knowledge of the Jacobian. …”
Get full text
Get full text
Get full text
Get full text
article -
55
Optical recognition of electrical circuit drawings
Published 1997Get full text
Get full text
article -
56
-
57
-
58
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
Published 2024“…<p dir="ltr">Mobile devices have become an essential element in our day-to-day lives. The chances of mobile attacks are rapidly increasing with the growing use of mobile devices. …”
-
59
Developing an online hate classifier for multiple social media platforms
Published 2020“…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …”
-
60
A survey and comparison of wormhole routing techniques in a meshnetworks
Published 1997Get full text
Get full text
article