Search alternatives:
developing based » developing a (Expand Search), developing 21st (Expand Search)
using algorithm » cosine algorithm (Expand Search)
colon algorithm » colony algorithm (Expand Search), cosine algorithm (Expand Search), carlo algorithm (Expand Search)
developing based » developing a (Expand Search), developing 21st (Expand Search)
using algorithm » cosine algorithm (Expand Search)
colon algorithm » colony algorithm (Expand Search), cosine algorithm (Expand Search), carlo algorithm (Expand Search)
-
681
A multi-pretraining U-Net architecture for semantic segmentation
Published 2025“…For the validation of the proposed model, we used data from 21,000 cell nuclei at a resolution of 1000 by 1000 pixels. …”
-
682
A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer
Published 2019“…The results of the analysis have shown that the proposed encryption algorithm can be used in identification and verification systems. …”
-
683
Impacts of On-Grid Solar PV on Distribution Networks and Potential Solutions: A Case Study in the Region of Zahle
Published 2025“…The siting and sizing methodology is conducted by considering five different optimization algorithms, namely the single-objective genetic algorithm (SOGA), the combined SOGA and loss sensitivity factor algorithm (SOGA-LSF), the multi-objective genetic algorithm (MOGA), the combined MOGA-LSF and the CAPADD algorithm of OpenDSS. …”
Get full text
Get full text
Get full text
masterThesis -
684
Local convexity preserving rational cubic spline curves
Published 1997“…An algorithm is presented which constructs a curve by interpolating the given data points. …”
Get full text
Get full text
article -
685
On sensor selection in mobile devices based on energy, application accuracy, and context metrics
Published 2013“…We use this algorithm to build a sensor selection model to choose among location sensors. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
686
Modeling and Guidance of an Underactuated Autonomous Underwater Vehicle
Published 2017Get full text
doctoralThesis -
687
Hardware Model of an Expandable RSA Cryptographic System
Published 1998“…Data security is an important aspect of information transmission and storage in an electronic form. …”
Get full text
Get full text
Get full text
masterThesis -
688
Deepfakes Signatures Detection in the Handcrafted Features Space
Published 2023“…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
Get full text
-
689
RRT and Octomap based 3D environment exploration and mapping
Published 2020Get full text
doctoralThesis -
690
Particle swarm optimization for multimachine power systemstabilizer design
Published 2001“…In this paper, a novel evolutionary algorithm based approach to optimal design of multimachine power system stabilizers (PSSs) is proposed. …”
Get full text
Get full text
article -
691
A fuzzy basis function network for generator excitation control
Published 1997“…The proposed FBFN is trained over a wide range of operating conditions in order to re-tune the PSS parameters in real-time based on generator loading conditions. The orthogonal least squares learning algorithm is developed for designing an adequate and parsimonious FBFN model. …”
Get full text
Get full text
article -
692
Failure-Rate Prediction for De Havilland Dash-8 Tires Employing Neural-Network Technique
Published 2006“…Six years of data are used for model building and validation. …”
Get full text
article -
693
A Blockchain Model for Secure Communications in Internet of Vehicles
Published 2021“…In this paper, we present a framework for secure IoV communications by utilizing the High Performance Blockchain Consensus (HPBC) algorithm. Based on a previously published communication model for VANETs that uses an efficient routing protocol for transmitting packets between vehicles, we describe in this paper how to integrate a blockchain model on top of the IoV communications system. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
694
Generic metadata representation framework for social-based event detection, description, and linkage
Published 2020“…SEDDaL consists of four main modules for: i) describing social media objects in a generic Metadata Representation Space Model (MRSM) consisting of three composite dimensions: temporal, spatial, and semantic, ii) evaluating the similarity between social media objects’ descriptions following MRSM, iii) detecting events from similar social media objects using an adapted unsupervised learning algorithm, where events are represented as clusters of objects in MRSM, and iv) identifying directional, metric, and topological relationships between events following MRSM’s dimensions. …”
Get full text
Get full text
Get full text
Get full text
article -
695
Benchmark on a large cohort for sleep-wake classification with machine learning techniques
Published 2019“…We identified among the traditional algorithms, two approaches that perform better than the algorithm implemented by the actigraphy device used in the MESA Sleep experiments. …”
-
696
-
697
Noise-Robust Parameter Estimation Of Linear Systems
Published 2020“…In this paper, a recursive parameters stimation algorithm, which is unbiased for a wide class of measurement noise, is developed. …”
Get full text
article -
698
Parallel processing
Published 2005“…Parallel algorithms, based on simulated annealing, neural networks and genetic algorithms, for mapping irregular data to multicomputers are presented and compared. …”
Get full text
Get full text
Get full text
conferenceObject -
699
Toward automatic motivator selection for autism behavior intervention therapy
Published 2022“…We use a Q-learning algorithm to solve the modeled problem. Our proposed solution is then implemented as a mobile application developed for special education plans coordination. …”
Get full text
Get full text
-
700
Enhancement of blocking performance in all-optical WDM networks. (c2012)
Published 2012Get full text
Get full text
masterThesis