Search alternatives:
method algorithm » mould algorithm (Expand Search)
making algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data making » data mining (Expand Search)
element » elements (Expand Search)
method algorithm » mould algorithm (Expand Search)
making algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data making » data mining (Expand Search)
element » elements (Expand Search)
-
81
-
82
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
Published 2007“…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …”
Get full text
Get full text
Get full text
article -
83
The application of control algorithm for optimal performance of evaporatively-cooled façade system in hot dry and humid weathers
Published 2021“…The optimization of the system parameters is expected to overcome the limitations of using evaporative coolers in humid countries. The application of the control algorithm managed to increase the reductions in the façade heat gain from 33.5% to 38.3%.…”
-
84
Evaluation of C-arm CT metal artifact reduction algorithm during intra-aneurysmal coil embolization
Published 2016“…This analysis was carried out to assess the improvements in both brain parenchyma and device visibility with MAR algorithm. Further, ground truth reference images from phantom experiments and clinical data were used for accurate assessment. …”
Get full text
Get full text
Get full text
Get full text
article -
85
Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights
Published 2021“…In the age of the smart city, Internet of Things (IoT), and big data analytics, the complex nature of data-driven civil infrastructures monitoring frameworks has not been fully matured. …”
Get full text
article -
86
-
87
Real-Time Performance Evaluation of a Genetic Algorithm Based Fuzzy Logic Controller for IPM Motor Drives
Published 2005“…The parameters for the GFLC are tuned by genetic algorithm (GA). The complete drive incorporating the GFLC is successfully implemented in real-time using a digital signal processor board DS 1102 for a laboratory 1-hp interior permanent magnet motor. …”
Get full text
article -
88
Evaluation of Aerosol Optical Depth and Aerosol Models from VIIRS Retrieval Algorithms over North China Plain
Published 2017“…Secondly, we evaluate the aerosol model types assumed by each algorithm, as well as the aerosol optical properties used in the AOD retrievals. …”
-
89
-
90
Optimizing overheating, lighting, and heating energy performances in Canadian school for climate change adaptation: Sensitivity analysis and multi-objective optimization methodolog...
Published 2023“…This paper aims to develop long-term adaptation strategies for the existing Canadian school buildings under extreme current and future climates using a developed methodology based on global and local sensitivity analysis and Multi-Objective Optimization Genetic Algorithm. …”
Get full text
Get full text
Get full text
-
91
Multi-Objective Optimisation of Injection Moulding Process for Dashboard Using Genetic Algorithm and Type-2 Fuzzy Neural Network
Published 2024“…Computational techniques, like the finite element method, are used to analyse behaviours based on varied input parameters. …”
-
92
Socially Motivated Approach to Simulate Negotiation Process
Published 2014Get full text
doctoralThesis -
93
A Survey of Audio Enhancement Algorithms for Music, Speech, Bioacoustics, Biomedical, Industrial, and Environmental Sounds by Image U-Net
Published 2023“…Although, there are dedicated audio processing DNNs, yet, many recent models of AE have utilized U-Net: a DNN based on Convolutional Neural Network (CNN), fundamentally developed for image segmentation. It is found that the useful features hidden in the time domain are highlighted when the audio signal is converted to a spectrogram, which can be treated as an image. …”
-
94
FarmTech: Regulating the use of digital technologies in the agricultural sector
Published 2023“…<p dir="ltr">Farming relies on the accurate collection and processing of data. Algorithms utilizing artificial intelligence can predict patterns and spot problems, helping farmers make more informed decisions. …”
-
95
An Artificial Neural Network for Online Tuning of Genetic Algorithm Based PI Controller for Interior Permanent Magnet Synchronous Motor–Drive
Published 2006“…At each operating condition a genetic algorithm (GA) is used to optimize proportional-integral (PI) controller parameters in a closed loop vector control scheme. …”
Get full text
article -
96
Bird’s Eye View feature selection for high-dimensional data
Published 2023“…This approach is inspired by the natural world, where a bird searches for important features in a sparse dataset, similar to how a bird search for sustenance in a sprawling jungle. BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …”
-
97
Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT
Published 2021“…There have been notable challenges regarding the security of data and challenges related to privacy when collecting real-time and automatic data while observing applications in the industry. …”
-
98
Nonlinear analysis of shell structures using image processing and machine learning
Published 2023“…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …”
-
99
-
100
Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform
Published 2022“…The proposed framework meets these privacy requirements by (i) anonymizing both the unique account identifier (NIN) and balance information through customized data generalization and distortion techniques and (ii) making trading transactions unlinkable to their original investors by ensuring that both the NIN and balance are <i>k</i> -anonymous; i.e., <i>k</i> accounts belonging to different investors have the same balance. …”