Search alternatives:
encoding algorithm » cosine algorithm (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
elements ii » elements _ (Expand Search)
binding » finding (Expand Search), findings (Expand Search), building (Expand Search)
encoding algorithm » cosine algorithm (Expand Search)
ii algorithm » rd algorithm (Expand Search), _ algorithms (Expand Search)
elements ii » elements _ (Expand Search)
binding » finding (Expand Search), findings (Expand Search), building (Expand Search)
-
61
Estimating Vehicle State by GPS/IMU Fusion with Vehicle Dynamics
Published 2013Get full text
doctoralThesis -
62
-
63
A Navigation and Control System for a Robot in Indoor/Outdoor Environments
Published 2016Get full text
doctoralThesis -
64
-
65
-
66
Corona power loss computation in bundled bipolar conductors
Published 2000Get full text
Get full text
article -
67
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …”
Get full text
Get full text
Get full text
Get full text
article -
68
-
69
Approximate XML structure validation technical report
Published 2014Get full text
Get full text
Get full text
article -
70
Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort
Published 2023“…However, these BEMSs often suffer from a critical limitation—they are primarily trained on building energy data alone, disregarding crucial elements such as occupant comfort and preferences. …”
-
71
Newton-Raphson based adaptive inverse control scheme for tracking of nonlinear dynamic plants
Published 2006“…Adaptive tracking of nonlinear dynamic plants is an essential element of many control applications. The main difficulty felt in establishing the tracking of nonlinear dynamic plants is the computational complexity in controller design. …”
Get full text
Get full text
article -
72
On the complexity of multi-parameterized cluster editing
Published 2017“…As a byproduct, we obtain a kernelization algorithm that delivers linear-size kernels when the two edge-edit bounds are small constants.…”
Get full text
Get full text
Get full text
Get full text
article -
73
Vibration suppression in a cantilever beam using a string-type vibration absorber
Published 2017“…The design of the vibration absorber is done in two steps. In the first, the spring stiffness, the position of the second attachment point of the string and a preliminary damping constant are calculated using a genetic algorithm approach where the objective function is the maximum displacement on the beam. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
74
Deep Neural Networks for Electromagnetic Inverse Scattering Problems in Microwave Imaging
Published 2023Get full text
doctoralThesis -
75
PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits
Published 2022“…Implications are that toxicity trigger detection algorithms can leverage generic approaches but must also tailor detections to specific communities.…”
-
76
Transformations for Variants of the Travelling Salesman Problem and Applications
Published 2017Get full text
doctoralThesis -
77
Cohen syndrome and early-onset epileptic encephalopathy in male triplets: two disease-causing mutations in VPS13B and NAPB
Published 2023“…Sanger sequencing verified the segregation of the two recessive gene variants with the phenotype in family members. The prediction algorithms support the pathogenicity of these variants. …”
-
78
Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates
Published 2022“…<h2>Purpose</h2> <p>We present an approach that combines finite element analysis and genetic algorithms to find the optimal configuration of local resonators created in the host structure to suppress their vibration in a target low-frequency range. …”
-
79
-
80
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
Published 2024“…As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. There are many machine-learning and deep-learning algorithms have been developed by researchers. …”