Search alternatives:
injection algorithm » detection algorithm (Expand Search), auction algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
element » elements (Expand Search)
Showing 161 - 180 results of 295 for search '(( element method algorithm ) OR ((( data injection algorithm ) OR ( data including algorithm ))))', query time: 0.09s Refine Results
  1. 161

    Future Prediction of COVID-19 Vaccine Trends Using a Voting Classifier by Syed Ali Jafar Zaidi (19563178)

    Published 2021
    “…Modern ML models are used for prediction, prioritization, and decision making. Multiple ML algorithms are used to improve decision-making at different aspects after forecasting. …”
  2. 162

    Corona power loss computation in bundled bipolar conductors by Al-Hamouz, Z.M.

    Published 2000
    “…In this paper, a finite element (FE) based algorithm devoted for the computation of the corona current and hence the corona power loss associated with bundled bipolar high voltage direct current (HVDC) conductors is presented. …”
    Get full text
    Get full text
    article
  3. 163

    Modelling of pollutant transport in compound open channels by Chatila, Jean Georges

    Published 1998
    “…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …”
    Get full text
    Get full text
    masterThesis
  4. 164

    Newton-Raphson based adaptive inverse control scheme for tracking of nonlinear dynamic plants by Shafiq, M.

    Published 2006
    “…The U-model is utilized to design an adaptive inverse controller by using a simple root-solving algorithm of Newton-Raphson. The synergy of U-model with AIC structure has provided an effective and straight forward method for adaptive tracking of nonlinear plants. …”
    Get full text
    Get full text
    article
  5. 165

    Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles by Warren, Thomas

    Published 2000
    “…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …”
    Get full text
    Get full text
    Get full text
    article
  6. 166

    A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study by Masurkar, Faeez

    Published 2022
    “…Further, As the quality of received signals differs at different sensing points as a result of the surface conditions of the specimen, the Self Adaptive Smart Algorithm (SASA) method was adopted to filter out the noise and accurately pinpoint the defect reflected wave packet which ultimately aids in better detection and localization. …”
    Get full text
  7. 167

    Vibration suppression in a cantilever beam using a string-type vibration absorber by Issa, Jimmy S.

    Published 2017
    “…The string is rigidly connected to the fixed end of the beam and through a spring and damper to a second point on the beam. The finite element method is used to model the system and a reduced order model is obtained through modal reduction performed on both the string and the beam. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 168
  9. 169

    Adaptive controlled superconducting magnetic energy storage devices for performance enhancement of wind energy systems by Rania A., Turky

    Published 2023
    “…The detailed modeling of the whole system is presented, including measured wind speed data, detailed switching techniques, a drive train model of the turbine, and real SMESD. …”
    Get full text
    Get full text
    Get full text
    article
  10. 170

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates by Ratiba F. Ghachi (14152455)

    Published 2022
    “…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …”
  11. 171
  12. 172

    A forward-backward Kalman for the estimation of time-variant channels in OFDM by Al-Naffouri, T.Y.

    Published 2005
    “…In this paper, we propose an expectation-maximization (EM) algorithm for joint channel and data recovery. The algorithm makes use of the rich structure of the underlying communication problem-a structure induced by the data and channel constraints. …”
    Get full text
    Get full text
    article
  13. 173

    Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks by Muhammed Al-Ali (16810677)

    Published 2023
    “…An optimal resource allocation scheme is proposed with two scenarios including a guaranteed fairness level and minimum data rate among eMBB users. …”
  14. 174

    A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem by Habchi, Wassim

    Published 2008
    “…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …”
    Get full text
    Get full text
    Get full text
    article
  15. 175

    An EM-Based Forward-Backward Kalman Filter for the Estimation of Time-Variant Channels in OFDM by Al-Naffouri, T.Y.

    Published 0000
    “…In this paper, we propose an expectation-maximization algorithm for joint channel and data recovery in fast fading environments. …”
    Get full text
    Get full text
    article
  16. 176

    I Will Survive: An Event-driven Conformance Checking Approach Over Process Streams by Raun, Kristo

    Published 2023
    “…This paper introduces a new approximate algorithm – I Will Survive (IWS). The algorithm utilizes the trie data structure to improve the calculation speed, while remaining memory-efficient. …”
    Get full text
    Get full text
    Get full text
  17. 177

    Exploratory risk prediction of type II diabetes with isolation forests and novel biomarkers by Yousef, Hibba

    Published 2024
    “…In particular, Isolation Forest (iForest) was applied as an anomaly detection algorithm to address class imbalance. iForest was trained on the control group data to detect cases of high risk for T2DM development as outliers. …”
    Get full text
  18. 178
  19. 179

    ARDENT: A Proactive Agent-Based Routing Protocol for Internet of Vehicles by Mazouzi, Mohamed

    Published 2023
    “…The design of an efficient routing algorithm for the Internet of Vehicles (IoV) poses several problems due to its special characteristics, including nodes high-speed mobility, frequent topology change, link instability, and the presence of radio obstacles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  20. 180

    A multi-pretraining U-Net architecture for semantic segmentation by Cagla Copurkaya (22502042)

    Published 2025
    “…<p dir="ltr">Pathological cancer research relies heavily on different domain-specific applications including nucleus segmentation from histopathology images. …”