Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
data algorithms » jaya algorithm (Expand Search)
element » elements (Expand Search)
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
data algorithms » jaya algorithm (Expand Search)
element » elements (Expand Search)
-
181
An enhanced quorum selection algorithm
Published 2009Get full text
Get full text
Get full text
article -
182
An Improved Quorum Selection Algorithm
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
183
Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las...
Published 2020“…A library of possible mother wavelets was designed based on the experimental data. As the inci dent wave for each sensing point varies because of the physical condition of the rail surface and the laser excitation, the algorithm automatically picks the mother wavelet from the library that generates the lar gest absolute cross-correlation with the incident wave. …”
Get full text
-
184
Enhanced PSO-Based NN for Failures Detection in Uncertain Wind Energy Systems
Published 2023“…First, a feature selection tool using PSO Algorithm is developed. Then, in order to maximize the diversity between data samples and improve the effectiveness of using PSO algorithm for feature selection, the Euclidean distance metric is used in order to reduce the data and maximize the diversity between data samples. …”
-
185
Optimization of Commercially Off the Shelf (COTS) Electric Propulsion System for Low Speed Fuel Cell UAV
Published 2013Get full text
doctoralThesis -
186
Defining quantitative rules for identifying influential researchers: Insights from mathematics domain
Published 2024“…<p>In the midst of a vast amount of scientific literature, the need for specific rules arise especially when it comes to deciding which impactful researchers should be nominated. These rules are based on measurable quantities that can easily be applied to a researcher's quantitative data. …”
-
187
-
188
Stochastic Search Algorithms for Exam Scheduling
Published 2007“…Then, we empirically compare the three proposed algorithms and FESP using realistic data. Our experimental results show that SA and GA produce good exam schedules that are better than those of FESP heuristic procedure. …”
Get full text
Get full text
article -
189
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
Get full text
-
190
A hybrid cryptosystem based on WEP for 802.11 networks. (c2006)
Published 2006Get full text
Get full text
masterThesis -
191
Data Redundancy Management in Connected Environments
Published 2020“…We describe its modules, and clustering-based algorithms. Moreover, our proposal detects temporal, and spatial-temporal redundancies in order to consider both static and mobile devices/sensors. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
192
Unsupervised outlier detection in multidimensional data
Published 2022“…<p>Detection and removal of outliers in a dataset is a fundamental preprocessing task without which the analysis of the data can be misleading. Furthermore, the existence of anomalies in the data can heavily degrade the performance of machine learning algorithms. …”
-
193
-
194
Robust Control Of Sampled Data Systems
Published 2020“…They then present a numerical controller design algorithm based on the derived bounds. Examples are used for demonstration.…”
Get full text
article -
195
Robust control of sampled data systems
Published 1998“…They then present a numerical controller design algorithm based on the derived bounds. Examples are given for demonstration…”
Get full text
Get full text
article -
196
Robust Control Of Sampled Data Systems
Published 2020“…They then present a numerical controller design algorithm based on the derived bounds. Examples are used for demonstration.…”
Get full text
article -
197
Robust Control Of Sampled Data Systems
Published 2020“…They then present a numerical controller design algorithm based on the derived bounds.Examples are used for demonstration.…”
Get full text
article -
198
Process Mining over Unordered Event Streams
Published 2020“…This requires online algorithms that, instead of keeping the whole history of event data, work incrementally and update analysis results upon the arrival of new events. …”
Get full text
Get full text
Get full text
-
199
-
200
A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks
Published 2022“…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. …”