Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
elemental » elementary (Expand Search), elements (Expand Search), element (Expand Search)
search » research (Expand Search)
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
elemental » elementary (Expand Search), elements (Expand Search), element (Expand Search)
search » research (Expand Search)
-
581
Learning Spatiotemporal Latent Factors of Traffic via Regularized Tensor Factorization: Imputing Missing Values and Forecasting
Published 2019“…The learned factors, with a graph-based temporal dependency, are then used in an autoregressive algorithm to predict the future state of the road network with a large horizon. …”
-
582
Identification of the Uncertainty Structure to Estimate the Acoustic Release of Chemotherapeutics From Polymeric Micelles
Published 2017“…The identified a priori knowledge is used to implement an optimal Kalman filter, a multi-hypothesis Kalman filter, and a variant of the full information estimator (moving horizon estimator) to the problem at hand. The proposed algorithms are initially deployed in a simulation environment, and then the experimental data sets are fed into the algorithms to validate their performance. …”
Get full text
article -
583
Lagrangian tracking in stochastic fields with application to an ensemble of velocity fields in the Red Sea
Published 2018“…Lagrangian tracking of passive tracers in a stochastic velocity field within a sequential ensemble data assimilation framework is challenging due to the exponential growth in the number of particles. …”
Get full text
Get full text
Get full text
Get full text
article -
584
-
585
Corrosion Monitoring Technologies for Reinforced Concrete Structures: A Review
Published 2023“…New technology, algorithms, data processing, and AI are new approaches to improving corrosion monitoring processes. …”
Get full text
-
586
The bus sightseeing problem
Published 2023“…A mixed-integer programming formulation for the BSP is provided and solved by a Benders decomposition algorithm. For large-scale instances, an iterated local search based metaheuristic algorithm is developed with some tailored neighborhood operators. …”
-
587
Finite state machine state assignment for area and power minimization
Published 2006“…A fuzzy-based aggregation function is employed to combine the two objectives. …”
Get full text
Get full text
article -
588
Scheduling and allocation in high-level synthesis using stochastic techniques
Published 2020“…High-level synthesis is the process of automatically translating abstract behavioral models of digital systems to implementable hardware. …”
Get full text
article -
589
Positive Unlabelled Learning to Recognize Dishes as Named Entity
Published 2019“…With the lack of labelled data, I try to overcome the cold start and avoid manual labelling by building a lookup table from a dictionary. …”
Get full text
-
590
Extremity Ischemia After Jellyfish Envenomation: A Case Report and Systematic Review of the Literature
Published 2022“…</p><h3>Methods</h3><p dir="ltr">A systematic review of cases of extremity ischemia and necrosis after envenomation by marine cnidarians was performed to clarify what is and what is not known about management and outcomes, to draw conclusions about how best to manage these rare presentations, and to establish an evidence-based algorithm.…”
-
591
A data envelopment analysis model for opinion leaders’ identification in social networks
Published 2024“…Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. …”
-
592
An Enhanced Approach for Solar PV Hosting Capacity Analysis in Distribution Networks
Published 2022“…These algorithms calculate the optimal HC based on six scenarios of annual load and DER generation profiles. …”
-
593
Modeling and Bias-Robust Estimation of the Acoustic Release of Chemotherapeutics from Liposomes
Published 2019“…Optimality is guaranteed by accurately identifying the underlying statistical noise characteristics in experimental data. The estimator also quantifies the bias in the release, exhibited by the experimental data. …”
Get full text
article -
594
Innovative mobile E-healthcare systems
Published 2016“…In this work, we propose a new cache replacement algorithm—Profit SACCS—that is based on the rule-based least profit value. …”
Get full text
Get full text
Get full text
Get full text
article -
595
Decision-level fusion for single-view gait recognition with various carrying and clothing conditions
Published 2017“…Such a system is needed in access control applications whereby a single view is imposed by the system setup. The gait data is firstly processed using three gait representation methods as the features sources; Accumulated Prediction Image (API) and two new gait representations namely; Accumulated Flow Image (AFI) and Edge-Masked Active Energy Image (EMAEI). …”
Get full text
article -
596
Enhancing resilience in the liquefied natural gas supply chain: A focus on chemical supply continuity
Published 2024“…Utilizing the K-means clustering algorithm, we categorize these supplies and pinpoint the most critical ones. …”
Get full text
Get full text
Get full text
article -
597
Reconstruction and simulation of neocortical microcircuitry
Published 2015“…The reconstruction uses cellular and synaptic organizing principles to algorithmically reconstruct detailed anatomy and physiology from sparse experimental data. …”
Get full text
Get full text
Get full text
Get full text
article -
598
Predicting stability of classes in an object-oriented system
Published 2010Get full text
Get full text
Get full text
article -
599
Uplink channel estimation for IMT-DS system
Published 2001“…A novel despreader-respreader based channel estimator (DRCE) is proposed to obtain uplink (UL) channel estimates at chip-level which resolves the deficiencies of conventional methods that work at symbol level. …”
Get full text
Get full text
article -
600
Anonymizing multimedia documents
Published 2016“…We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …”
Get full text
Get full text
Get full text
Get full text
article