Search alternatives:
research algorithm » search algorithm (Expand Search)
encoding algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
binding » finding (Expand Search), findings (Expand Search), building (Expand Search)
research algorithm » search algorithm (Expand Search)
encoding algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
binding » finding (Expand Search), findings (Expand Search), building (Expand Search)
-
21
Vibration suppression in a cantilever beam using a string-type vibration absorber
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
22
Assessment of static pile design methods and non-linear analysis of pile driving
Published 2006“…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …”
Get full text
Get full text
Get full text
masterThesis -
23
XBeGene: Scalable XML Documents Generator by Example Based on Real Data
Published 2012Get full text
Get full text
Get full text
Get full text
conferenceObject -
24
PERF solutions for distributed query optimization. (c1999)
Published 1999Get full text
Get full text
masterThesis -
25
A Geometric-Primitives-Based Compression Scheme for Testing Systems-on-a-Chip
Published 2001“…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data.…”
Get full text
article -
26
A geometric-primitives-based compression scheme for testingsystems-on-a-chip
Published 2001“…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data…”
Get full text
Get full text
article -
27
STEM: spatial speech separation using twin-delayed DDPG reinforcement learning and expectation maximization
Published 2025“…For stationary sources, the proposed system gives satisfactory performance in terms of quality, intelligibility, and separation speed, and generalizes well with the test data from a mismatched speech corpus. Its perceptual evaluation of speech quality (PESQ) score is 0.55 points better than a self-supervised learning (SSL) model and almost equivalent to the diffusion models at computational cost and training data which is many folds lesser than required by these algorithms. …”
-
28
Dynamic adaptation for video streaming over mobile devices. (c2013)
Published 2013Get full text
Get full text
masterThesis -
29
Query acceleration in distributed database systems
Published 2001“…Query optimization strategies aim to minimize the cost of transferring data across networks. Many techniques and algorithms have been proposed to optimize queries. …”
Get full text
Get full text
Get full text
article -
30
Multidimensional Gains for Stochastic Approximation
Published 2019Get full text
Get full text
Get full text
Get full text
article -
31
Communications in electronic textile systems
Published 2017Get full text
Get full text
Get full text
conferenceObject -
32
-
33
A Navigation and Control System for a Robot in Indoor/Outdoor Environments
Published 2016Get full text
doctoralThesis -
34
Structural similarity evaluation between XML documents and DTDs
Published 2007“…The automatic processing and management of XML-based data are ever more popular research issues due to the increasing abundant use of XML, especially on the Web. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
35
A survey and comparison of wormhole routing techniques in a meshnetworks
Published 1997“…These multiprocessing systems consist of processing elements or nodes which are connected together by interconnection networks in various topologies. …”
Get full text
Get full text
article -
36
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
Published 2024“…As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. There are many machine-learning and deep-learning algorithms have been developed by researchers. …”
-
37
-
38
Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants
Published 2024“…Besides this, the findings reclaim that “reasons” (for/against) shape to form the attitude of consumers toward voice assistants. The current research offers preliminary evidence with regard to the investigation of voice assistant adoption using the BRT that jointly examines enabling and inhibiting elements leading to consumers’ attitude formation. …”
-
39
Deep Neural Networks for Electromagnetic Inverse Scattering Problems in Microwave Imaging
Published 2023Get full text
doctoralThesis -
40
PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits
Published 2022“…Implications are that toxicity trigger detection algorithms can leverage generic approaches but must also tailor detections to specific communities.…”