Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
defined » designed (Expand Search)
Showing 281 - 300 results of 392 for search '(( elements method algorithm ) OR ((( data processing algorithm ) OR ( defined using algorithm ))))', query time: 0.12s Refine Results
  1. 281

    Newton-Raphson based adaptive inverse control scheme for tracking of nonlinear dynamic plants by Shafiq, M.

    Published 2006
    “…The U-model is utilized to design an adaptive inverse controller by using a simple root-solving algorithm of Newton-Raphson. The synergy of U-model with AIC structure has provided an effective and straight forward method for adaptive tracking of nonlinear plants. …”
    Get full text
    Get full text
    article
  2. 282

    A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer by M. Z. Yildiz (16855476)

    Published 2019
    “…Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. …”
  3. 283

    The Role of Artificial Intelligence in Decoding Speech from EEG Signals: A Scoping Review by Uzair Shah (15740699)

    Published 2022
    “…The study selection process was carried out in three phases: study identification, study selection, and data extraction. …”
  4. 284

    A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem by Habchi, Wassim

    Published 2008
    “…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …”
    Get full text
    Get full text
    Get full text
    article
  5. 285

    A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study by Masurkar, Faeez

    Published 2022
    “…Further, As the quality of received signals differs at different sensing points as a result of the surface conditions of the specimen, the Self Adaptive Smart Algorithm (SASA) method was adopted to filter out the noise and accurately pinpoint the defect reflected wave packet which ultimately aids in better detection and localization. …”
    Get full text
  6. 286

    Reconstruction and simulation of neocortical microcircuitry by Khazen, Georges

    Published 2015
    “…We present a first-draft digital reconstruction of the microcircuitry of somatosensory cortex of juvenile rat. The reconstruction uses cellular and synaptic organizing principles to algorithmically reconstruct detailed anatomy and physiology from sparse experimental data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 287

    The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions by Abdulmalik Alwarafy (17984104)

    Published 2022
    “…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
  8. 288

    A Terrain classification system for coseismic landslide hazard analysis: Lebanon, a case study by Grant, Alex R.

    Published 2014
    “…Terrain classification was modeled after the work of Iwahashi and Pike (2007), which has been shown to relate to engineering properties of the landscape (eg Vs 30, Yong et al., 2012) using slope, curvature, and roughness. In this work topographic slope, calculated using Ritter’s algorithm (1987) is used to demarcate landslide failure modes. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 289

    Topology and parameter estimation in power systems through inverter-based broadband stimulations by Margossian, Harag

    Published 2015
    “…Broadband stimulation signals are injected from distributed generators and their effects are measured at various locations in the grid. To process and evaluate this data, a novel aggregation method based on weighed least squares will be proposed in this study. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 290

    Benchmark on a large cohort for sleep-wake classification with machine learning techniques by Joao Palotti (8479842)

    Published 2019
    “…However, the largest experiments conducted to date, have had only hundreds of participants. In this work, we processed the data of the recently published Multi-Ethnic Study of Atherosclerosis (MESA) Sleep study to have both PSG and actigraphy data synchronized. …”
  11. 291

    AGEomics Biomarkers and Machine Learning—Realizing the Potential of Protein Glycation in Clinical Diagnostics by Naila Rabbani (291722)

    Published 2022
    “…AGEomics biomarkers have been used in diagnostic algorithms using machine learning methods. …”
  12. 292
  13. 293

    Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles by Warren, Thomas

    Published 2000
    “…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …”
    Get full text
    Get full text
    Get full text
    article
  14. 294

    A Survey of Deep Learning Approaches for the Monitoring and Classification of Seagrass by Uzma Nawaz (21980708)

    Published 2025
    “…By synthesizing findings across various data sources and model architectures, we offer critical insights into the selection of context-aware algorithms and identify key research gaps, an essential step for advancing the reliability and applicability of AI-driven seagrass conservation efforts.…”
  15. 295

    Design and analysis of efficient and secure elliptic curve cryptoprocessors. by Al-Somani, Turki Faisal

    Published 2006
    “…Elliptic Curve Cryptosystems have attracted many researchers and have been included in many standards such as IEEE, ANSI, NIST, SEC and WTLS. The ability to use smaller keys and computationally more efficient algorithms compared with earlier public key cryptosystems such as RSA and ElGamal are two main reasons why elliptic curve cryptosystems are becoming more popular. …”
    Get full text
    masterThesis
  16. 296

    Identification of the Uncertainty Structure to Estimate the Acoustic Release of Chemotherapeutics From Polymeric Micelles by Wadi, Ali

    Published 2017
    “…The identified a priori knowledge is used to implement an optimal Kalman filter, a multi-hypothesis Kalman filter, and a variant of the full information estimator (moving horizon estimator) to the problem at hand. The proposed algorithms are initially deployed in a simulation environment, and then the experimental data sets are fed into the algorithms to validate their performance. …”
    Get full text
    article
  17. 297

    Lagrangian tracking in stochastic fields with application to an ensemble of velocity fields in the Red Sea by Issa, Leila

    Published 2018
    “…Lagrangian tracking of passive tracers in a stochastic velocity field within a sequential ensemble data assimilation framework is challenging due to the exponential growth in the number of particles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  18. 298
  19. 299

    Corrosion Monitoring Technologies for Reinforced Concrete Structures: A Review by SHEHADEH, KHADIJA

    Published 2023
    “…New technology, algorithms, data processing, and AI are new approaches to improving corrosion monitoring processes. …”
    Get full text
  20. 300

    Vibration suppression in a cantilever beam using a string-type vibration absorber by Issa, Jimmy S.

    Published 2017
    “…The string is rigidly connected to the fixed end of the beam and through a spring and damper to a second point on the beam. The finite element method is used to model the system and a reduced order model is obtained through modal reduction performed on both the string and the beam. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject