Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
systems using » system using (Expand Search)
element » elements (Expand Search)
update » updated (Expand Search)
Showing 861 - 880 results of 986 for search '(( element update algorithm ) OR ((( data processing algorithm ) OR ( systems using algorithm ))))', query time: 0.13s Refine Results
  1. 861

    A modified optimal design of a vibration absorber for ground motion isolation by Issa, Jimmy S.

    Published 2014
    “…Recently, a new vibration absorber setup was proposed where the absorber is placed between the dynamic system and its moving support. The problem was solved and design guidelines were proposed using the classical absorber design technique. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  2. 862

    Design and development of an embedded controller for roboticmanipulator by Bakhashwain, J.M.

    Published 1998
    “…Mohseni's Proposed Algorithm, MPA, has been incorporated into the embedded controller to reduce the computational efforts and to obtain a close-to-optimal control law. …”
    Get full text
    Get full text
    article
  3. 863

    Optimized FPGA Implementation of PWAM-Based Control of Three—Phase Nine—Level Quasi Impedance Source Inverter by Syed Rahman (569240)

    Published 2019
    “…In this paper, closed loop control of nine - level three - phase qZSI system is implemented using single FPGA control board thereby eliminating above said problems. …”
  4. 864

    GenDE: A CRF-Based Data Extractor by Kayed, Mohammed

    Published 2020
    “…It verifies the site schema and extracts data from the Web pages using Conditional Random Fields (CRFs). The problem is solved by breaking down an observation sequence (a Web page) into simpler subsequences that will be labeled using CRF. …”
    Get full text
    Get full text
  5. 865

    CNN and HEVC Video Coding Features for Static Video Summarization by Issa, Obada

    Published 2022
    “…The accuracy of the proposed key-frame detection system was assessed using the positive predictive values, sensitivity, and F-scores. …”
    Get full text
    article
  6. 866

    Design of adaptive arrays based on element position perturbations by Dawoud, M.M.

    Published 1993
    “…The proposed adaptive system is used to form automatically the required nulls in the direction of arrival of the interference. …”
    Get full text
    Get full text
    article
  7. 867

    A microscale evaluation of pavement roughness effects for asset management by El Khoury, John

    Published 2013
    “…The results of the study validate the relationship between acceleration/road roughness and fuel consumption. Finally, using the described technology, a pothole detection algorithm is devised to automatically map road roughness, a step towards a better asset management system.…”
    Get full text
    Get full text
    Get full text
    article
  8. 868

    Information Warfare by Haraty, Ramzi A.

    Published 2015
    “…The algorithm is based on data dependency and uses a single matrix that will be later used during recovery.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 869

    ARDENT: A Proactive Agent-Based Routing Protocol for Internet of Vehicles by Mazouzi, Mohamed

    Published 2023
    “…The design of an efficient routing algorithm for the Internet of Vehicles (IoV) poses several problems due to its special characteristics, including nodes high-speed mobility, frequent topology change, link instability, and the presence of radio obstacles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 870

    UAV Trajectory Planning for Data Collection from Time-Constrained IoT Devices by Samir, Moataz

    Published 2019
    “…We demonstrate the favourable characteristics of the proposed algorithms via extensive simulation results and analysis as a function of various system parameters, with benchmarking against two greedy algorithms based on distance and deadline metrics.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 871

    Extreme Early Image Recognition Using Event-Based Vision by Abubakar Abubakar (18278998)

    Published 2023
    “…<p dir="ltr">While deep learning algorithms have advanced to a great extent, they are all designed for frame-based imagers that capture images at a high frame rate, which leads to a high storage requirement, heavy computations, and very high power consumption. …”
  12. 872
  13. 873

    DASSI: differential architecture search for splice identification from DNA sequences by Shabir Moosa (14153316)

    Published 2022
    “…The demand for robust algorithms over the recent years has brought huge success in the field of Deep Learning (DL) in solving many difficult tasks in image, speech and natural language processing by automating the manual process of architecture design. …”
  14. 874

    DeepRaman: Implementing surface-enhanced Raman scattering together with cutting-edge machine learning for the differentiation and classification of bacterial endotoxins by Samir Brahim, Belhaouari

    Published 2025
    “…ConclusionWe present the effectiveness of DeepRaman, an innovative architecture inspired by the Progressive Fourier Transform and integrated with the scalogram transformation method, in classifying raw SERS Raman spectral data from biological specimens with unparalleled accuracy relative to conventional machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  15. 875

    Agent-Based Reactive Geographic Routing Protocol for Internet of Vehicles by Mazouzi, Mohamed

    Published 2023
    “…The design of an efficient routing algorithm for Internet of Vehicles (IoV) is a challenging research issue due to the inherent characteristics of IoV network, such as high-speed mobility of nodes, frequent topology change, link instability, and the presence of radio obstacles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  16. 876

    Deepfakes Signatures Detection in the Handcrafted Features Space by Hamadene, Assia

    Published 2023
    “…Researches on generative data assume that synthetic data are as close as possible to real data, this is why, they are either used for training systems when used for data augmentation tasks or are used to fake systems as synthetic attacks. …”
    Get full text
  17. 877

    Enhanced Inverse Model Predictive Control for EV Chargers: Solution for Rectifier-Side by Ali Sharida (17947847)

    Published 2024
    “…Then, an adaptive estimation strategy employing a recursive least square algorithm is proposed for online dynamic model estimation, which is then used by the IMPC for optimal switching states prediction. …”
  18. 878

    The Generalization of Bidirectional Dual Active Bridge DC/DC Converter Modulation Schemes: State-of-the-Art Analysis under Triple Phase Shift Control by Yasen Harrye (22415632)

    Published 2023
    “…<p dir="ltr">The main objective of this paper is to provide a thorough analysis of currently used modulation control schemes for single-phase bidirectional dual active bridge DC/DC converters. …”
  19. 879

    Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements by Stefano Nardean (14151900)

    Published 2023
    “…Therefore, we designed a dedicated two-stage strategy, inspired by the CPR algorithm, where a block preconditioner is used for the pressure part with the aim at exploiting the inner $$2\times 2$$ 2 × 2 structure. …”
  20. 880

    Detecting and Predicting Archaeological Sites Using Remote Sensing and Machine Learning—Application to the Saruq Al-Hadid Site, Dubai, UAE by Ben-Romdhane, Haïfa

    Published 2023
    “…An integrated approach, featuring the application of advanced image processing techniques and geospatial analysis using machine learning, was adopted to characterise the site while automating the process and investigating its applicability. …”
    Get full text
    article