Search alternatives:
method algorithm » mould algorithm (Expand Search)
element » elements (Expand Search)
tracking » training (Expand Search), taking (Expand Search)
method algorithm » mould algorithm (Expand Search)
element » elements (Expand Search)
tracking » training (Expand Search), taking (Expand Search)
-
401
Low Cost Autopilot Design Using Fuzzy Supervisory Control
Published 2005Get full text
doctoralThesis -
402
Information Warfare
Published 2015“…The algorithm is based on data dependency and uses a single matrix that will be later used during recovery.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
403
Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature
Published 2022“…MethodsA systematic review of cases of extremity ischemia and necrosis after envenomation by marine cnidarians was performed to clarify what is and what is not known about management and outcomes, to draw conclusions about how best to manage these rare presentations, and to establish an evidence-based algorithm. …”
Get full text
Get full text
Get full text
article -
404
Impact Of Multidisciplinary Maternal Resuscitation Training Program on Improving the Front-Line Care Provider’s Readiness to Manage Maternal Cardiac Arrest: A Pre-test/Post-test St...
Published 2024“…The multidisciplinary resuscitation teams were observed during the cardiac arrest mock drills both before and after conducting the multidisciplinary resuscitation simulation-based training program and the introduction of the maternal resuscitation algorithm pathway against seven KPIs. …”
-
405
Ensemble Deep Random Vector Functional Link Neural Network for Regression
Published 2022“…The esc-edRVFL is identified as the best-performing algorithm through a comprehensive evaluation of 31 UCI datasets.…”
-
406
Predicting Calcein Release from Ultrasound-Targeted Liposomes: A Comparative Analysis of Random Forest and Support Vector Machine
Published 2024“…The type of algorithm employed to predict drug release from liposomes plays an important role in affecting the accuracy. …”
Get full text
article -
407
An Iterative Heuristic for State Justi�cation in Sequential Automatic Test Pattern Generation
Published 2001“…In this work, we adopt a hybrid approach for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justifcation sequences vector by vector. …”
Get full text
article -
408
A novel hybrid methodology for fault diagnosis of wind energy conversion systems
Published 2023“…Therefore, a hybrid feature selection based diagnosis technique, that can preserve the advantages of wrapper and filter algorithms as well as RF model, is proposed. …”
-
409
Learning Spatiotemporal Latent Factors of Traffic via Regularized Tensor Factorization: Imputing Missing Values and Forecasting
Published 2019“…The learned factors, with a graph-based temporal dependency, are then used in an autoregressive algorithm to predict the future state of the road network with a large horizon. …”
-
410
The bus sightseeing problem
Published 2023“…A mixed-integer programming formulation for the BSP is provided and solved by a Benders decomposition algorithm. For large-scale instances, an iterated local search based metaheuristic algorithm is developed with some tailored neighborhood operators. …”
-
411
Nonlinear Friction Identification of A Linear Voice Coil DC Motor
Published 2015Get full text
doctoralThesis -
412
Finite state machine state assignment for area and power minimization
Published 2006“…A fuzzy-based aggregation function is employed to combine the two objectives. …”
Get full text
Get full text
article -
413
Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature
Published 2022“…</p><h3>Methods</h3><p dir="ltr">A systematic review of cases of extremity ischemia and necrosis after envenomation by marine cnidarians was performed to clarify what is and what is not known about management and outcomes, to draw conclusions about how best to manage these rare presentations, and to establish an evidence-based algorithm.…”
-
414
A data envelopment analysis model for opinion leaders’ identification in social networks
Published 2024“…Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. …”
-
415
An Enhanced Approach for Solar PV Hosting Capacity Analysis in Distribution Networks
Published 2022“…These algorithms calculate the optimal HC based on six scenarios of annual load and DER generation profiles. …”
-
416
Innovative mobile E-healthcare systems
Published 2016“…In this work, we propose a new cache replacement algorithm—Profit SACCS—that is based on the rule-based least profit value. …”
Get full text
Get full text
Get full text
Get full text
article -
417
Enhancing resilience in the liquefied natural gas supply chain: A focus on chemical supply continuity
Published 2024“…Utilizing the K-means clustering algorithm, we categorize these supplies and pinpoint the most critical ones. …”
Get full text
Get full text
Get full text
article -
418
Information warfare recovery-fighting back through the matrix. (c2012)
Published 2012Get full text
Get full text
masterThesis -
419
Predicting stability of classes in an object-oriented system
Published 2010Get full text
Get full text
Get full text
article -
420
Uplink channel estimation for IMT-DS system
Published 2001“…A novel despreader-respreader based channel estimator (DRCE) is proposed to obtain uplink (UL) channel estimates at chip-level which resolves the deficiencies of conventional methods that work at symbol level. …”
Get full text
Get full text
article