Search alternatives:
deer algorithm » search algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
elements deer » elementi per (Expand Search)
3d algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
based 3d » based _ (Expand Search)
deer algorithm » search algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
elements deer » elementi per (Expand Search)
3d algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
based 3d » based _ (Expand Search)
-
61
Computation of conformal invariants
Published 2021“…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …”
-
62
Analysis of Using Machine Learning to Enhance the Efficiency of Facilities Management in the UAE
Published 2022“…This study addresses these issues by Implementing Machine Learning (ML) algorithms using data from Building Management Systems (BMS) and FM maintenance reports, focussing on predictive maintenance for Fresh Air Handling Units. …”
Get full text
-
63
Scatter search for homology modeling
Published 2016“…However this technique suffers from poor initial target-template alignments. To improve homology based PSP, we propose a scatter search (SS) metaheuristic algorithm. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
64
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security
Published 2024“…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …”
-
65
Downlink channel estimation for IMT-DS
Published 2001“…IMT-DS system is an approved terrestrial radio interface standard for 3G mobile communication based on direct sequence code division multiple access (DS-CDMA). It employs a RAKE receiver to exploit multipath diversity. …”
Get full text
Get full text
article -
66
Computational evluation of protein energy functions
Published 2014“…Also, we propose an approach based on a simulated annealing algorithm to find a better combination of energy terms, by assigning different weights to the terms, for the purpose of improving the capability of the computational prediction methods.…”
Get full text
Get full text
Get full text
conferenceObject -
67
Morphology for Planar Hexagonal Modular Self-Reconfigurable Robotic Systems
Published 2009Get full text
doctoralThesis -
68
Dynamic multiple node failure recovery in distributed storage systems
Published 2018“…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …”
Get full text
Get full text
Get full text
Get full text
article -
69
Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model
Published 2024“…The proposed approach of DDN is trained with proper data sequences used for communication and the training phase is conducted with the norms of numerous channel variants. …”
-
70
A Navigation System for Indoor/Outdoor Environments with an Unmanned Ground Vehicle (UGV)
Published 2015Get full text
doctoralThesis -
71
Automated quantification of penile curvature using artificial intelligence
Published 2022“…<h3>Objective</h3><p dir="ltr">To develop and validate an artificial intelligence (AI)-based algorithm for capturing automated measurements of Penile curvature (PC) based on 2-dimensional images.…”
-
72
Mobile Robot Navigation in Dynamic Environments Using an Improved RRT* Approach
Published 2018Get full text
doctoralThesis -
73
-
74
Microwave brain imaging system to detect brain tumor using metamaterial loaded stacked antenna array
Published 2022“…<p dir="ltr">In this paper, proposes a microwave brain imaging system to detect brain tumors using a metamaterial (MTM) loaded three-dimensional (3D) stacked wideband antenna array. The antenna is comprised of metamaterial-loaded with three substrate layers, including two air gaps. …”
-
75
Development of Machine Learning Models for Studying the Premixed Turbulent Combustion of Gas-To-Liquids (GTL) Fuel Blends
Published 2024“…<p dir="ltr">Studying the spatial and temporal evolution in turbulent flames represents one of the most challenging problems in the combustion community. Based on previous 3D numerical analyses, this study aims to develop data-driven machine learning (ML) models for predicting the flame radius evolution and turbulent flame speeds for diesel, gas-to-liquids (GTL), and their 50/50 blend (by volumetric composition) under different thermodynamic and turbulence operating conditions. …”
-
76
Making progress with the automation of systematic reviews: principles of the International Collaboration for the Automation of Systematic Reviews (ICASR)
Published 2018“…Recent advances in natural language processing, text mining and machine learning have produced new algorithms that can accurately mimic human endeavour in systematic review activity, faster and more cheaply. …”
-
77
Nonlinear analysis of shell structures using image processing and machine learning
Published 2023“…The proposed approach can be significantly more efficient than training a machine learning algorithm using the raw numerical data. To evaluate the proposed method, two different structures are assessed where the training data is created using nonlinear finite element analysis. …”
-
78
Design and analysis of entropy-constrained reflected residual vector quantization
Published 2002“…Jointly optimized RVQ (JORVQ) is an effective design algorithm for minimizing the overall quantization error. …”
Get full text
Get full text
article -
79
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
Published 2021“…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …”
-
80
Role of authentication factors in Fin-tech mobile transaction security
Published 2023“…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…”