Search alternatives:
method algorithm » mould algorithm (Expand Search)
element » elements (Expand Search)
tracking » training (Expand Search), taking (Expand Search)
method algorithm » mould algorithm (Expand Search)
element » elements (Expand Search)
tracking » training (Expand Search), taking (Expand Search)
-
161
Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles
Published 2000“…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …”
Get full text
Get full text
Get full text
article -
162
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
Published 2022“…Further, As the quality of received signals differs at different sensing points as a result of the surface conditions of the specimen, the Self Adaptive Smart Algorithm (SASA) method was adopted to filter out the noise and accurately pinpoint the defect reflected wave packet which ultimately aids in better detection and localization. …”
Get full text
-
163
Vibration suppression in a cantilever beam using a string-type vibration absorber
Published 2017“…The string is rigidly connected to the fixed end of the beam and through a spring and damper to a second point on the beam. The finite element method is used to model the system and a reduced order model is obtained through modal reduction performed on both the string and the beam. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
164
-
165
Adaptive controlled superconducting magnetic energy storage devices for performance enhancement of wind energy systems
Published 2023“…The detailed modeling of the whole system is presented, including measured wind speed data, detailed switching techniques, a drive train model of the turbine, and real SMESD. …”
Get full text
Get full text
Get full text
article -
166
Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates
Published 2022“…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …”
-
167
Using machine learning for disease detection. (c2013)
Published 2016Get full text
Get full text
masterThesis -
168
A forward-backward Kalman for the estimation of time-variant channels in OFDM
Published 2005“…In this paper, we propose an expectation-maximization (EM) algorithm for joint channel and data recovery. The algorithm makes use of the rich structure of the underlying communication problem-a structure induced by the data and channel constraints. …”
Get full text
Get full text
article -
169
Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks
Published 2023“…An optimal resource allocation scheme is proposed with two scenarios including a guaranteed fairness level and minimum data rate among eMBB users. …”
-
170
A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem
Published 2008“…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …”
Get full text
Get full text
Get full text
article -
171
An EM-Based Forward-Backward Kalman Filter for the Estimation of Time-Variant Channels in OFDM
Published 0000“…In this paper, we propose an expectation-maximization algorithm for joint channel and data recovery in fast fading environments. …”
Get full text
Get full text
article -
172
Enhanced DC Microgrid Protection: a Neural Network and Wavelet Transform Approach
Published 2024Get full text
doctoralThesis -
173
I Will Survive: An Event-driven Conformance Checking Approach Over Process Streams
Published 2023“…This paper introduces a new approximate algorithm – I Will Survive (IWS). The algorithm utilizes the trie data structure to improve the calculation speed, while remaining memory-efficient. …”
Get full text
Get full text
Get full text
-
174
Exploratory risk prediction of type II diabetes with isolation forests and novel biomarkers
Published 2024“…In particular, Isolation Forest (iForest) was applied as an anomaly detection algorithm to address class imbalance. iForest was trained on the control group data to detect cases of high risk for T2DM development as outliers. …”
Get full text
-
175
Public schools regrouping decision support system. (c1997)
Published 1997Get full text
Get full text
masterThesis -
176
ARDENT: A Proactive Agent-Based Routing Protocol for Internet of Vehicles
Published 2023“…The design of an efficient routing algorithm for the Internet of Vehicles (IoV) poses several problems due to its special characteristics, including nodes high-speed mobility, frequent topology change, link instability, and the presence of radio obstacles. …”
Get full text
Get full text
Get full text
Get full text
article -
177
A multi-pretraining U-Net architecture for semantic segmentation
Published 2025“…<p dir="ltr">Pathological cancer research relies heavily on different domain-specific applications including nucleus segmentation from histopathology images. …”
-
178
Active distribution network type identification method of high proportion new energy power system based on source-load matching
Published 2023“…Firstly, the typical daily output scenarios of DG are extracted by clustering method, and the generalized load curve model is solved by the optimization algorithm to obtain the source load operation data; Secondly, calculate the source-load matching indicators (including matching performance, matching degree, and matching rate) according to the source load data of each region, and identify the distribution network type according to the range of the index values; Finally, several indicators are introduced to quantify the characteristics of different types of distribution networks. …”
Get full text
Get full text
Get full text
article -
179
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
Published 2010“…Accordingly security threats and data banks attacks turn out to be a phenomenon. Thus, granting protection to such crucial information becomes a high demand. …”
Get full text
-
180
Scatter search metaheuristic for homology based protein structure prediction. (c2015)
Published 2015Get full text
Get full text
masterThesis