Showing 21 - 40 results of 900 for search '(( element method algorithm ) OR ((( data encoding algorithm ) OR ( data backing algorithm ))))', query time: 0.61s Refine Results
  1. 21
  2. 22

    (HSCRC) encoding scheme. by R. Sakthivel (2589547)

    Published 2024
    “…<div><p>Loss-less data compression becomes the need of the hour for effective data compression and computation in VLSI test vector generation and testing in addition to hardware AI/ML computations. …”
  3. 23
  4. 24
  5. 25
  6. 26

    Algorithmic experimental parameter design. by Chuanxi Xing (20141665)

    Published 2024
    “…Furthermore, the estimation of the DOA can be accurately carried out under low signal-to-noise ratio conditions. This method effectively utilizes the degrees of freedom provided by the virtual array, reducing noise interference, and exhibiting better performance in terms of positioning accuracy and algorithm stability.…”
  7. 27
  8. 28
  9. 29
  10. 30

    LPCRC-Scheme- 2 encoding. by R. Sakthivel (2589547)

    Published 2024
    “…<div><p>Loss-less data compression becomes the need of the hour for effective data compression and computation in VLSI test vector generation and testing in addition to hardware AI/ML computations. …”
  11. 31

    (EBRGC)-Scheme- 3 encoding. by R. Sakthivel (2589547)

    Published 2024
    “…<div><p>Loss-less data compression becomes the need of the hour for effective data compression and computation in VLSI test vector generation and testing in addition to hardware AI/ML computations. …”
  12. 32

    (HSCRC) Scheme-1 encoding. by R. Sakthivel (2589547)

    Published 2024
    “…<div><p>Loss-less data compression becomes the need of the hour for effective data compression and computation in VLSI test vector generation and testing in addition to hardware AI/ML computations. …”
  13. 33
  14. 34
  15. 35
  16. 36
  17. 37
  18. 38

    Optimized Bayesian regularization-back propagation neural network using data-driven intrusion detection system in Internet of Things by Ashok Kumar K (21441108)

    Published 2025
    “…This research presents Data-Driven Intrusion Detection System in Internet of Things utilizing Optimized Bayesian Regularization-Back Propagation Neural Network (DIDS-BRBPNN-BBWOA-IoT) to overcome these issues. …”
  19. 39

    Overview of the C&CG method. by Tianhe Sun (21145341)

    Published 2025
    “…The model is solved iteratively using the column generation algorithm and strong duality theory. Case studies on a Northeast China power grid demonstrate that, by optimally configuring generation and storage capacity guided by flexibility and other indicators, the proposed method reduces curtailment/load shedding costs and system flexibility insufficiency probability by 45% and 4.3% respectively. …”
  20. 40

    Spatial spectrum estimation for three algorithms. by Chuanxi Xing (20141665)

    Published 2024
    “…Furthermore, the estimation of the DOA can be accurately carried out under low signal-to-noise ratio conditions. This method effectively utilizes the degrees of freedom provided by the virtual array, reducing noise interference, and exhibiting better performance in terms of positioning accuracy and algorithm stability.…”