Search alternatives:
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
-
801
Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects
Published 2023“…Construction data management and integration are difficult. AI algorithms depend on data for training and analysis. …”
Get full text
-
802
Low-Cost Reduced Navigation System for Mobile Robot in Indoor/Outdoor Environments
Published 2020“…For the indoor environment, where GPS signals are blocked, another EKF algorithm is proposed using low cost depth sensor (Microsoft Kinect stream). …”
Get full text
article -
803
Real-Time Implementation of GPS Aided Low Cost Strapdown Inertial Navigation System
Published 2009Get full text
doctoralThesis -
804
Impact of birth weight to placental weight ratio and other perinatal risk factors on left ventricular dimensions in newborns: a prospective cohort analysis
Published 2024“…Chi-squared and one-way analysis of variance were used to compare BW/PW groups and the best regression model was selected using a genetic and backward stepwise algorithm.…”
-
805
-
806
Dynamic single node failure recovery in distributed storage systems
Published 2017“…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …”
Get full text
Get full text
Get full text
Get full text
article -
807
Deepfakes Signatures Detection in the Handcrafted Features Space
Published 2023“…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
Get full text
-
808
The Assessment and Allocation of Public Private Partnership Risks in the UAE
Published 2022Get full text
doctoralThesis -
809
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
Published 2021“…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…”
-
810
Machine Learning-Based Approach for EV Charging Behavior
Published 2021Get full text
doctoralThesis -
811
-
812
Hybrid Interval Type-2 Fuzzy PID+I Controller for a Multi-DOF Oilwell Drill-String System
Published 2022“…An optimal hybrid interval Type-2 fuzzy PID+I logic controller (OH-IT2FPID+I) using a practical swarm optimization algorithm for a multi-degree-of-freedom oil well drill-string system is proposed in this paper. …”
-
813
Systems biology analysis reveals NFAT5 as a novel biomarker and master regulator of inflammatory breast cancer
Published 2015“…</p><h3>Methods</h3><p dir="ltr">In-silico modeling and Algorithm for the Reconstruction of Accurate Cellular Networks (ARACNe) on IBC/non-IBC (nIBC) gene expression data (n = 197) was employed to identify novel master regulators connected to the IBC phenotype. …”
-
814
-
815
Optimal Dispatch of Mobile Energy Storage Unit to Support EV Charging Stations
Published 2021Get full text
doctoralThesis -
816
Axes-Based Encryption Key
Published 2018“…For this, a need of robust security systems is raised to ensure that our data will be kept safe. This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
817
ON THE FFT OF 1-BIT DITHER-QUANTIZED DETERMINISTIC SIGNALS
Published 2020“…This loss in accuracy will in turn prohibit exploiting the practical advantages that an FFT algorithm, with a coarsely-quantized input, will otherwise enjoy. …”
Get full text
article -
818
On the protection of power system: Transmission line fault analysis based on an optimal machine learning approach
Published 2022“…The design is carried out based on the selection of the optimal model parameters using a search optimization algorithm called GridSearchCV. …”
-
819
-
820
Resilience analytics: coverage and robustness in multi-modal transportation networks
Published 2018“…In this work, we propose MUME, an efficient algorithm for Multi-modal Urban Mobility Estimation, that takes advantage of the special structure of the supra-Laplacian matrix of the transportation multiplex, to compute the coverage of the system. …”