Search alternatives:
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
element » elements (Expand Search)
-
581
Inferential sensing techniques in industrial applications
Published 0007“…Real data from a boiler plant is used to develop the model. …”
Get full text
masterThesis -
582
Agent-Based Reactive Geographic Routing Protocol for Internet of Vehicles
Published 2023“…The performance evaluation shows significant improvements in terms of query success ratio, data packet delivery, and end-to-end delay while reducing communication interruptions and overhead.…”
Get full text
Get full text
Get full text
Get full text
article -
583
A Novel Internal Model Control Scheme for Adaptive Tracking of Nonlinear Dynamic Plants
Published 2006“…The U-model utilizes only past data for plant modelling and standard root solving algorithm for control law formulation. …”
Get full text
Get full text
article -
584
Information warfare
Published 2017“…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
Get full text
Get full text
Get full text
Get full text
article -
585
On end-to-end scheduling in wireless cellular networks
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
586
A Biologicaly Inspired Decision Model for Multivariable Genetic- Fuzzy-AHP System
Published 2016“…This paper describes a hybridized intelligent algorithm as a tuning mechanism for one type of Genetic Fuzzy system termed the Genetic Fuzzimetric Technique (GFT). …”
Get full text
Get full text
Get full text
Get full text
article -
587
Design and development of an embedded controller for roboticmanipulator
Published 1998“…Mohseni's Proposed Algorithm, MPA, has been incorporated into the embedded controller to reduce the computational efforts and to obtain a close-to-optimal control law. …”
Get full text
Get full text
article -
588
Computation of conformal invariants
Published 2020“…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …”
Get full text
Get full text
Get full text
article -
589
A Micro-Economics Approach for Scheduling in CDMA Networks with End-to-End QoS Guarantees
Published 2007Get full text
Get full text
Get full text
Get full text
conferenceObject -
590
HARDWARE DESIGN AND VLSI IMPLEMENTATION OF A BYTE-WISE CRC GENERATOR CHIP
Published 2020“…The number of clocl cycles required to generate and transmitany CRC (for an 8 hour bytemessage) is just two more that the time required to calculate it (in all 10 clocl pulses. The CRC chip can be used in anumber of applications. These include areas such as error detection and correction in data comunication, signature analysis and mass storage devices for parallel information transfers.…”
Get full text
article -
591
A Hardware Model of an Expandable RSA Cryptogrsphic System
Published 1998“…Data security is an important aspect of information transmission and storage in an electronic form. …”
Get full text
masterThesis -
592
A microscale evaluation of pavement roughness effects for asset management
Published 2013“…The results of the study validate the relationship between acceleration/road roughness and fuel consumption. Finally, using the described technology, a pothole detection algorithm is devised to automatically map road roughness, a step towards a better asset management system.…”
Get full text
Get full text
Get full text
article -
593
Predicting Calcein Release from Ultrasound-Targeted Liposomes: A Comparative Analysis of Random Forest and Support Vector Machine
Published 2024“…The type of algorithm employed to predict drug release from liposomes plays an important role in affecting the accuracy. …”
Get full text
article -
594
A Geometric-Primitives-Based Compression Scheme for Testing Systems-on-a-Chip
Published 2001“…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data.…”
Get full text
article -
595
A geometric-primitives-based compression scheme for testingsystems-on-a-chip
Published 2001“…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data…”
Get full text
Get full text
article -
596
Exploring Digital Competitiveness through Bayesian Belief Networks
Published 2025“…The methodology involves constructing BBN models using data from the IMD Digital Competitiveness Ranking 2023 for 64 countries. …”
Get full text
article -
597
Hardware design and VLSI implementation of a byte-wise CRCgenerator chip
Published 1995“…The number of clock cycles required to generate and transmit any CRC (for an 8 byte message) is just two more than the time required to calculate it (in all 10 clock pulses). The CRC chip can be used in a number of applications. These include areas such as error detection and correction in data communications, signature analysis, and mass storage devices for parallel information transfers…”
Get full text
Get full text
article -
598
Online Control and Optimization of Directional Drilling
Published 2020“…Detailed mathematical formulation and computer simulation were used for evaluation of the performance of the proposed techniques for both systems, based on real well data.…”
Get full text
masterThesis -
599
Iterative Methods for the Solution of a Steady State Biofilter Model
Published 2017Get full text
doctoralThesis -
600