Search alternatives:
using algorithm » cosine algorithm (Expand Search)
developing each » developing a (Expand Search)
doses algorithm » deer algorithm (Expand Search), cosine algorithm (Expand Search)
each algorithm » search algorithm (Expand Search), jaya algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
developing each » developing a (Expand Search)
doses algorithm » deer algorithm (Expand Search), cosine algorithm (Expand Search)
each algorithm » search algorithm (Expand Search), jaya algorithm (Expand Search)
-
521
Modeling, testing, and regression testing of web applications. (c2006)
Published 2006Get full text
Get full text
masterThesis -
522
Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials
Published 1997“…The proposed techniques are: i) a batch-type deconvolution method using the complex bicepstrum algorithm, and ii) automatic ultrasonic defect classification system using a modular learning strategy. …”
Get full text
masterThesis -
523
Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations
Published 2007“…The design makes use of projective coordinates together with scalable Montgomery multipliers for data size of up to 256-bits. …”
Get full text
Get full text
article -
524
-
525
A Novel Internal Model Control Scheme for Adaptive Tracking of Nonlinear Dynamic Plants
Published 2006“…The U-model utilizes only past data for plant modelling and standard root solving algorithm for control law formulation. …”
Get full text
Get full text
article -
526
Information warfare
Published 2017“…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
Get full text
Get full text
Get full text
Get full text
article -
527
Identification of the Uncertainty Structure to Estimate the Acoustic Release of Chemotherapeutics From Polymeric Micelles
Published 2017“…The proposed algorithms are initially deployed in a simulation environment, and then the experimental data sets are fed into the algorithms to validate their performance. …”
Get full text
article -
528
On end-to-end scheduling in wireless cellular networks
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
529
Design and development of an embedded controller for roboticmanipulator
Published 1998“…Mohseni's Proposed Algorithm, MPA, has been incorporated into the embedded controller to reduce the computational efforts and to obtain a close-to-optimal control law. …”
Get full text
Get full text
article -
530
Computation of conformal invariants
Published 2020“…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …”
Get full text
Get full text
Get full text
article -
531
A geographic information system method to generate long term regional solar radiation resource maps: enhancing decision-making
Published 2024“…The regression-kriging algorithm and its variants are used to calibrate satellite data, through interpolation of ground solar radiation data. …”
-
532
Investigation of Forming a Framework to shortlist contractors in the tendering phase
Published 2022“…After obtaining the weights of the decision factors, a model using Machine Learning algorithm on Google Colab was written using the Python language. …”
Get full text
-
533
A Micro-Economics Approach for Scheduling in CDMA Networks with End-to-End QoS Guarantees
Published 2007Get full text
Get full text
Get full text
Get full text
conferenceObject -
534
Optimal Routing Protocol in Multimedia Wireless Sensor Networks
Published 2011Get full text
doctoralThesis -
535
CFD Based Airfoil Shape Optimization for Aerodynamic Drag Reduction
Published 2012Get full text
doctoralThesis -
536
HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP
Published 2020“…The number of clocl cycles required to generate and transmitany CRC (for an 8 hour bytemessage) is just two more that the time required to calculate it (in all 10 clocl pulses. The CRC chip can be used in anumber of applications. These include areas such as error detection and correction in data comunication, signature analysis and mass storage devices for parallel information transfers.…”
Get full text
article -
537
CNN feature and classifier fusion on novel transformed image dataset for dysgraphia diagnosis in children
Published 2023“…The pre-trained DenseNet201 network is used for CNN feature extraction from each task-specific handwritten image data. …”
Get full text
Get full text
Get full text
article -
538
An Alternating Projection Framework for Elementwise Masked Nonlinear Matrix Decomposition
Published 2025Get full text
doctoralThesis -
539
A Hardware Model of an Expandable RSA Cryptogrsphic System
Published 1998“…Data security is an important aspect of information transmission and storage in an electronic form. …”
Get full text
masterThesis -
540
A microscale evaluation of pavement roughness effects for asset management
Published 2013“…The results of the study validate the relationship between acceleration/road roughness and fuel consumption. Finally, using the described technology, a pothole detection algorithm is devised to automatically map road roughness, a step towards a better asset management system.…”
Get full text
Get full text
Get full text
article