Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
systems using » system using (Expand Search)
element » elements (Expand Search)
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
systems using » system using (Expand Search)
element » elements (Expand Search)
-
361
New efficient frequency domain algorithm for H∞approximation with applications to controller reduction
Published 2001“…The new algorithm is used to obtain reduced order controllers for a well known control problem…”
Get full text
Get full text
article -
362
-
363
Communications in electronic textile systems
Published 2017Get full text
Get full text
Get full text
conferenceObject -
364
Prediction the performance of multistage moving bed biological process using artificial neural network (ANN)
Published 2020“…To cope with this difficult task and perform an effective and well-controlled BP operation, an artificial neural network (ANN) algorithm was developed to simulate, model, and control a three-stage (anaerobic/anoxic and MBBR) enhanced nutrient removal biological process (ENR-BP) challenging real wastewater. …”
-
365
-
366
KNNOR: An oversampling technique for imbalanced datasets
Published 2021“…The proposed technique called K-Nearest Neighbor OveRsampling approach (KNNOR) performs a three step process to identify the critical and safe areas for augmentation and generate synthetic data points of the minority class. …”
-
367
License plate recognition system
Published 2003“…This paper proposes an automatic license plate recognition system for Saudi Arabian license plates. The system presents an algorithm for the extraction of license plate and segmentation of characters. …”
Get full text
Get full text
article -
368
Adaptive temperature control of a reverse flow process by using reinforcement learning approach
Published 2024“…It should be mentioned that this approach is not reliant on the internal dynamics of the CFRR system, which is a complex process and is most effectively modeled using Partial Differential Equations (PDEs). …”
-
369
Improved Jaya Synergistic Swarm Optimization Algorithm to Optimize Task Scheduling Problems in Cloud Computing
Published 2024“…We evaluate the proposed algorithm against state-of-the-art approaches using benchmark task scheduling problems in cloud environments. …”
Get full text
-
370
Machine Learning-Driven Prediction of Corrosion Inhibitor Efficiency: Emerging Algorithms, Challenges, and Future Outlooks
Published 2025“…At the same time, virtual sample augmentation and genetic algorithm feature selection elevate sparse data performance, raising k-nearest neighbor models from R<sup>2</sup> = 0.05 to 0.99 in a representative thiophene set. …”
-
371
-
372
A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group
Published 2023“…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …”
-
373
Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images
Published 2022“…Over the decade, numerous artificial neural network (ANN)-based techniques were adopted in order to diagnose and classify breast cancer due to the unique characteristics of learning key features from complex data via a training process. However, these schemes have limitations like slow convergence and longer training time. …”
-
374
-
375
Spatially-Distributed Missions With Heterogeneous Multi-Robot Teams
Published 2021“…Both combine a generic MILP solver and a genetic algorithm, resulting in efficient anytime algorithms. …”
-
376
IntruSafe: a FCNN-LSTM hybrid IoMT intrusion detection system for both string and 2D-spatial data using sandwich architecture
Published 2025“…The IoMT manufacturers need to offer their products at a competitive price, which forces them to use simplified architecture, leaving limited and, to some extent, no scope to employ sophisticated cybersecurity algorithms. …”
-
377
Interpreting patient-Specific risk prediction using contextual decomposition of BiLSTMs: application to children with asthma
Published 2019“…We extend the method to bidirectional LSTMs (BiLSTMs) and use it in the context of predicting future clinical outcomes using patients’ EHR historical visits.…”
-
378
Auto Takeoff and Precision Landing using Integrated GPS/INS/Optical Flow Solution
Published 2015Get full text
doctoralThesis -
379
-
380
Query acceleration in distributed database systems
Published 2001Get full text
Get full text
Get full text
article