Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
mean algorithm » deer algorithm (Expand Search), search algorithm (Expand Search)
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
mean algorithm » deer algorithm (Expand Search), search algorithm (Expand Search)
-
461
A simulated annealing-based optimal controller for a three phase induction motor
Published 2002“…This paper presents a new approach for optimal controller design of a three-phase induction motor (IM), based on using the simulated annealing (SA) method to find the optimal controller gains that satisfy a specific performance criterion. …”
Get full text
Get full text
article -
462
A novel technique for fast multiplication
Published 1995“…In this algorithm the partial products of the multiplicand and three bits of the multiplier are pre-calculated using only hardwired shifts. …”
Get full text
Get full text
article -
463
A stochastic PID controller for a class of MIMO systems
Published 2017Get full text
Get full text
Get full text
Get full text
article -
464
The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions
Published 2022“…Towards this, we first overview the existing traditional RRAM methods and identify their limitations that motivate the use of DRL techniques in RRAM. Then, we provide a comprehensive review of the most widely used DRL algorithms to address RRAM problems, including the value- and policy-based algorithms. …”
-
465
Toward automatic motivator selection for autism behavior intervention therapy
Published 2022“…We use a Q-learning algorithm to solve the modeled problem. …”
Get full text
Get full text
-
466
Identification of the Uncertainty Structure to Estimate the Acoustic Release of Chemotherapeutics From Polymeric Micelles
Published 2017“…The identified a priori knowledge is used to implement an optimal Kalman filter, a multi-hypothesis Kalman filter, and a variant of the full information estimator (moving horizon estimator) to the problem at hand. The proposed algorithms are initially deployed in a simulation environment, and then the experimental data sets are fed into the algorithms to validate their performance. …”
Get full text
article -
467
Lagrangian tracking in stochastic fields with application to an ensemble of velocity fields in the Red Sea
Published 2018“…Lagrangian tracking of passive tracers in a stochastic velocity field within a sequential ensemble data assimilation framework is challenging due to the exponential growth in the number of particles. …”
Get full text
Get full text
Get full text
Get full text
article -
468
Corrosion Monitoring Technologies for Reinforced Concrete Structures: A Review
Published 2023“…New technology, algorithms, data processing, and AI are new approaches to improving corrosion monitoring processes. …”
Get full text
-
469
Efficient unified Montgomery inversion with multi-bit shifting
Published 2005“…The similarity of the two algorithms allows the design of a single unified hardware architecture that performs the computation of inversion in both fields. …”
Get full text
Get full text
article -
470
A geographic information system method to generate long term regional solar radiation resource maps: enhancing decision-making
Published 2024“…The availability of solar radiation throughout the country has been mapped here using ground-based measurements and satellite data. The regression-kriging algorithm and its variants are used to calibrate satellite data, through interpolation of ground solar radiation data. …”
-
471
An evolutionary approach to load balancing parallel computations
Published 1991“…It is based on a genetic algorithm that combines a number of design choices in order to ameliorate the problem of premature convergence. …”
Get full text
Get full text
Get full text
conferenceObject -
472
Positive Unlabelled Learning to Recognize Dishes as Named Entity
Published 2019“…With the lack of labelled data, I try to overcome the cold start and avoid manual labelling by building a lookup table from a dictionary. …”
Get full text
-
473
Modelling of pollutant transport in compound open channels
Published 1998“…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …”
Get full text
Get full text
masterThesis -
474
Newton-Raphson based adaptive inverse control scheme for tracking of nonlinear dynamic plants
Published 2006“…The U-model is utilized to design an adaptive inverse controller by using a simple root-solving algorithm of Newton-Raphson. …”
Get full text
Get full text
article -
475
Modeling and Bias-Robust Estimation of the Acoustic Release of Chemotherapeutics from Liposomes
Published 2019“…Optimality is guaranteed by accurately identifying the underlying statistical noise characteristics in experimental data. The estimator also quantifies the bias in the release, exhibited by the experimental data. …”
Get full text
article -
476
Timing influenced general-cell genetic floorplanner
Published 2020“…The first phase is implemented using genetic algorithm while in the second phase we adopt a constraint graph based approach. …”
Get full text
Get full text
article -
477
Anomaly Detection Based Framework for Profile Monitoring
Published 2023Get full text
doctoralThesis -
478
Reconstruction and simulation of neocortical microcircuitry
Published 2015“…The reconstruction uses cellular and synaptic organizing principles to algorithmically reconstruct detailed anatomy and physiology from sparse experimental data. …”
Get full text
Get full text
Get full text
Get full text
article -
479
Anonymizing multimedia documents
Published 2016“…We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …”
Get full text
Get full text
Get full text
Get full text
article -
480
Efficient utilization of scalable multipliers in parallel to compute GF(p) elliptic curve cryptographic operations
Published 2007“…This paper presents the design and implementation of an elliptic curve cryptographic core to realize point scalar multiplication operations used for the GF(p) elliptic curve encryption/decryption and the elliptic curve digital signature algorithm (ECDSA). …”
Get full text
Get full text
article