Search alternatives:
processing algorithm » processing algorithms (Expand Search)
rd algorithm » _ algorithms (Expand Search)
a algorithm » _ algorithms (Expand Search), jaya algorithm (Expand Search)
elementi rd » elementi per (Expand Search)
processing algorithm » processing algorithms (Expand Search)
rd algorithm » _ algorithms (Expand Search)
a algorithm » _ algorithms (Expand Search), jaya algorithm (Expand Search)
elementi rd » elementi per (Expand Search)
-
701
On the complexity of bilinear computations
Published 1984“…Arithmetic complexity theory is the study of the minimum number of non-scalar multiplications required to compute a set of bilinear forms. One can show that we can restrict ourselves to bilinear algorithms. …”
Get full text
Get full text
Get full text
masterThesis -
702
H.264/AVC to HEVC Video Transcoder Based on Dynamic Thresholding and Content Modeling
Published 2014“…Then, two types of mode mapping algorithms are proposed. In the first solution, a single H.264/AVC coding parameter is used to determine the outgoing HEVC partitions using dynamic thresholding. …”
Get full text
article -
703
An Enhanced Approach for Solar PV Hosting Capacity Analysis in Distribution Networks
Published 2022“…The developed algorithms were tested on the IEEE 123 bus network, and their results were compared. …”
-
704
Radar Pulse Interleaving For Multi-Target Tracking
Published 2020“…Interleaving algorithms developed to operate radars exploit the dead-times between the transmitted and the received pulses to allocate new tracking tasks that might involve transmitting or receiving pulses, thus increasing the capacity of the system. …”
Get full text
article -
705
Machine Learning-Based Approach for EV Charging Behavior
Published 2021Get full text
doctoralThesis -
706
Crashworthiness optimization of composite hexagonal ring system using random forest classification and artificial neural network
Published 2024“…The ultimate target is to develop a robust multi-modal machine learning method to predict the optimum geometry (i.e., hexagonal ring angle) and suitable in-plane crushing arrangements of the hexagonal ring system for targeted crashworthiness parameters. …”
-
707
Four quadrant robust quick response optimally efficient inverterfed induction motor drive
Published 1989“…The control algorithms developed are readily implementable with present-day microprocessors…”
Get full text
Get full text
article -
708
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
Published 2015“…All the approach components and algorithms realizing the proposed analysis semantics have been implemented in one development framework. …”
Get full text
Get full text
Get full text
article -
709
Sense and Learn: Recent Advances in Wearable Sensing and Machine Learning for Blood Glucose Monitoring and Trend-Detection
Published 2022“…</p><h2>Other Information</h2><p dir="ltr">Published in: Frontiers in Bioengineering and Biotechnology<br>License: <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.3389/fbioe.2022.876672" target="_blank">https://dx.doi.org/10.3389/fbioe.2022.876672</a></p>…”
-
710
Deploying model obfuscation: towards the privacy of decision-making models on shared platforms
Published 2024“…To this end, we propose a conceptual and algorithmic framework of a model obfuscation scheme. …”
Get full text
Get full text
-
711
Blood-Based Proteomic Profiling Identifies Potential Biomarker Candidates and Pathogenic Pathways in Dementia
Published 2023“…Identifying the minimally invasive biomarkers associated with dementia that could provide insights into the disease pathogenesis, improve early diagnosis, and facilitate the development of effective treatments is pressing. Proteomic studies have emerged as a promising approach for identifying the protein biomarkers associated with dementia. …”
-
712
Autopilot Design and Commercial Autopilot Evaluation Using Flybarless Helicopter
Published 2014Get full text
doctoralThesis -
713
An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection
Published 2022“…The binary enhanced RSO is built based on three successive modifications: i) an S-shape transfer function is used to develop binary RSO algorithms; ii) the local search paradigm of particle swarm optimization is used with the iterative loop of RSO to boost its local exploitation; iii) three crossover mechanisms are used and controlled by a switch probability to improve the diversity. …”
-
714
Connectionist technique estimates of hydrogen storage capacity on metal hydrides using hybrid GAPSO-LSSVM approach
Published 2024“…Meanwhile, the estimation of hydrogen storage capacity will accelerate their development procedure. Machine learning algorithms can predict the correlation between the metal hydride chemical composition and its hydrogen storage capacity. …”
-
715
Comparative Study on Arabic Text Classification: Challenges and Opportunities
Published 2022“…This made finding certain text classification algorithms that fit a specific language or a set of languages a difficult task for researchers. …”
Get full text
-
716
Machine Learning Techniques for Pharmaceutical Bioinformatics
Published 2018“…In this matrix, each drug is represented by a vector of attributes from all other drugs. A predictive model is developed to predict drug indication as well as to predict new DDIs using multiple machine learning algorithms. …”
Get full text
-
717
Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security
Published 2024“…These benchmark datasets contain a variety of multivariate IoT attacks. The aim is to demonstrate the robustness of the proposed algorithms in effectively identifying telnet, password, distributed denial of service (DDoS), injection, and backdoor vulnerabilities in IoT ecosystems. …”
-
718
Discrimination between genuine and acted expressions using EEG signals and machine learning
Published 2019Get full text
doctoralThesis -
719
Common weaving approach in mainstream languages for software security hardening
Published 2013“…GIMPLE weaving accompanied by a common aspect-oriented language (1) allows security experts providing security solutions using this common language, (2) lets developers focus on the main functionality of programs by relieving them from the burden of security issues, (3) unifies the matching and the weaving processes for mainstream languages, and (4) facilitates introducing new security features in AOP languages. …”
Get full text
Get full text
Get full text
article -
720
Parameter Identification of Flexible Drive Systems using Particle Swarm Optimization
Published 2023Get full text
doctoralThesis