Search alternatives:
method algorithm » mould algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
model algorithm » mould algorithm (Expand Search)
element » elements (Expand Search)
method algorithm » mould algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
model algorithm » mould algorithm (Expand Search)
element » elements (Expand Search)
-
21
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
22
YOLO-DefXpert: An Advanced Defect Detection on PCB Surfaces Using Improved YOLOv11 Algorithm
Published 2025“…This study introduces an improved PCB defect detection model, YOLO-DefXpert, using the YOLOv11 algorithm to address the low accuracy and efficiency challenges in detecting tiny-sized defects on PCBs. …”
-
23
Interval-Valued SVM Based ABO for Fault Detection and Diagnosis of Wind Energy Conversion Systems
Published 2022“…<p>In this paper, special attention is paid to the detection and diagnosis of various incipient faults of uncertain wind energy conversion (WEC) systems. …”
-
24
Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study
Published 2021“…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …”
Get full text
article -
25
Cyberbullying Detection and Abuser Profile Identification on Social Media for Roman Urdu
Published 2024Subjects: -
26
AI and IoT-based concrete column base cover localization and degradation detection algorithm using deep learning techniques
Published 2023“…The results of this study demonstrated the effectiveness of the proposed defect detection and localization algorithm as it managed to read all barcodes, localize defective columns, and binary classify the condition of the concrete covers against their surrounding objects. …”
Get full text
Get full text
Get full text
article -
27
-
28
-
29
Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts
Published 2022“…The research work carried out, in relation to attack detection ensemble learning, mainly aims to increase the performance of machine learning algorithms by combining their results. …”
Get full text
-
30
-
31
The Use of Microwave Tomography in Bone Healing Monitoring
Published 2019Get full text
doctoralThesis -
32
-
33
-
34
Design of adaptive arrays based on element position perturbations
Published 1993“…The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …”
Get full text
Get full text
article -
35
-
36
Exposure of Botnets in Cloud Environment by Expending Trust Model with CANFES Classification Approach
Published 2022“…The goal is to be able to detect a larger range of bots and botnets by relying on several techniques called trust model. …”
-
37
Nonlinear analysis of shell structures using image processing and machine learning
Published 2023“…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …”
-
38
-
39
Automatic Video Summarization Using HEVC and CNN Features
Published 2022Get full text
doctoralThesis -
40