Search alternatives:
implement research » implementation research (Expand Search)
research algorithm » search algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
level using » level fusion (Expand Search)
implement research » implementation research (Expand Search)
research algorithm » search algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
level using » level fusion (Expand Search)
-
261
On the complexity of multi-parameterized cluster editing
Published 2017“…In other words, Cluster Editing can be solved efficiently when the number of false positives/negatives per single data element is expected to be small compared to the minimum cluster size. …”
Get full text
Get full text
Get full text
Get full text
article -
262
Benchmark on a large cohort for sleep-wake classification with machine learning techniques
Published 2019“…We identified among the traditional algorithms, two approaches that perform better than the algorithm implemented by the actigraphy device used in the MESA Sleep experiments. …”
-
263
A method for efficient NoC test scheduling using deterministic routing
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
264
Spherical cavity-expansion forcing function in PRONTO 3D for application to penetration problems
Published 2017Get full text
Get full text
Get full text
conferenceObject -
265
-
266
Modeling and Guidance of an Underactuated Autonomous Underwater Vehicle
Published 2017Get full text
doctoralThesis -
267
-
268
A Hardware Model of an Expandable RSA Cryptogrsphic System
Published 1998“…To cope with the continuous demand for larger key sizes, faster hardware implementations of the RSA algorithm has become an active area of research. …”
Get full text
masterThesis -
269
Mobile hospitals routing for prioritized patients
Published 2017“…This paper implements and tests an intelligent variable neighbourhood search algorithm for MHRP. …”
Get full text
Get full text
conferenceObject -
270
-
271
Hardware Model of an Expandable RSA Cryptographic System
Published 1998“…To cope with the continuous demand for larger key sizes, faster hardware implementations of the RSA algorithm has become an active area of research. …”
Get full text
Get full text
Get full text
masterThesis -
272
Towards Multimedia Fragmentation
Published 2006Get full text
Get full text
Get full text
Get full text
conferenceObject -
273
Cross entropy error function in neural networks
Published 2002Get full text
Get full text
Get full text
conferenceObject -
274
Integration of nonparametric fuzzy classification with an evolutionary-developmental framework to perform music sentiment-based analysis and composition
Published 2019“…Unlike existing solutions, MUSEC is: (i) a hybrid crossover between supervised learning (SL, to learn sentiments from music) and evolutionary computation (for music composition, MC), where SL serves at the fitness function of MC to compose music that expresses target sentiments, (ii) extensible in the panel of emotions it can convey, producing pieces that reflect a target crisp sentiment (e.g., love) or a collection of fuzzy sentiments (e.g., 65% happy, 20% sad, and 15% angry), compared with crisp-only or two-dimensional (valence/arousal) sentiment models used in existing solutions, (iii) adopts the evolutionary-developmental model, using an extensive set of specially designed music-theoretic mutation operators (trille, staccato, repeat, compress, etc.), stochastically orchestrated to add atomic (individual chord-level) and thematic (chord pattern-level) variability to the composed polyphonic pieces, compared with traditional evolutionary solutions producing monophonic and non-thematic music. …”
Get full text
Get full text
Get full text
Get full text
article -
275
A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications
Published 2011“…The proposed scheme monitors the signal strength level during the file transfer process and compresses data blocks on-the-fly only whenever energy reduction gain is expected. …”
Get full text
Get full text
Get full text
article -
276
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
Published 2022“…Fifth, it is also observed that the actuation and sensing position plays a crucial role in receiving the time-domain data with a sufficient SNR and the one that is easy to analyze and interpret. …”
Get full text
-
277
Improving the Secure Socket Layer Protocol by modifying its Authentication function
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
278
A Robust Deep Learning Approach for Distribution System State Estimation with Distributed Generation
Published 2023“…Conventional methods, which are used to solve state estimation on the transmission level, require the grid to be observable. …”
Get full text
Get full text
Get full text
masterThesis -
279
Assessment of static pile design methods and non-linear analysis of pile driving
Published 2006“…The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …”
Get full text
Get full text
Get full text
masterThesis -
280
Assessment of Inventory and Transportation Collaboration in a Logistics Marketplace
Published 2020Get full text
doctoralThesis