Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
-
381
An effective design system for dynamically reconfigurable architectures
Published 2017“…In this paper, we use the Joint Photographic Experts Group (JPEG) image compression algorithm as a design example to demonstrate the effectiveness of dynamic reconfiguration achieved using SPARCS. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
382
Heat rate curve approximation for power plants without data measuring devices
Published 2012“…The method is applied on a given power system, in which we calculate the electricity cost using the CAPSE (computer aided power economics) algorithm. …”
Get full text
article -
383
Exploring new horizons in neuroscience disease detection through innovative visual signal analysis
Published 2024“…We introduce the concept of eye-naked classification, which integrates domain-specific knowledge and clinical expertise into the classification process. Our study demonstrates the effectiveness of the FBFT method, achieving impressive accuracies across multiple brain disorders using CNN-based classification. …”
-
384
Optimum Track to Track Fusion Using CMA-ES and LSTM Techniques
Published 2024“…The sensors are unbiased radars with fixed locations. The first method uses an offline technique based on a global optimizer called the CMA-ES algorithm and the second one uses LSTM in its different forms to learn the online adjustment of the fusion weights between the two tracks. …”
Get full text
-
385
Rate Adaptation in Dynamic Adaptive Video Streaming Over HTTP
Published 2021Get full text
doctoralThesis -
386
A Survey of Deep Learning Approaches for the Monitoring and Classification of Seagrass
Published 2025“…Deep learning approaches have made significant progress in digital image processing, particularly in object recognition and classification, and are among the most popular computer vision tools. …”
-
387
On the Generation of Quantified Lemmas
Published 2018“…<p dir="ltr">In this paper we present an algorithmic method of lemma introduction. Given a proof in predicate logic with equality the algorithm is capable of introducing several universal lemmas. …”
-
388
Measuring ripple effect for object-oriented programs. (c2004)
Published 2004Get full text
Get full text
masterThesis -
389
Optimization metaheuristic for software testing
Published 2013“…This paper presents an evolutionary method for testing web applications. Although state-based testing has been reported, few papers have addressed modern web applications. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
390
Mobile Robot Navigation in Dynamic Environments Using an Improved RRT* Approach
Published 2018Get full text
doctoralThesis -
391
A matheuristic approach for solving the 2-connected dominating set problem
Published 2019“…The algorithm is based on a Greedy Randomized Adaptive Search Procedure (GRASP). …”
-
392
On Indefinite Quadratic Optimization over the Intersection of Balls and Linear Constraints
Published 2022“…To solve e-TRS, we use the alternating direction method of multipliers approach and a branch and bound algorithm. …”
-
393
Localization of Damages in Plain And Riveted Aluminium Specimens using Lamb Waves
Published 2018“…The genetic optimization (GO) method is used to further refine the location of damage within the enclosed area obtained using astroid algorithm. …”
Get full text
-
394
Fast Transient Stability Assessment of Power Systems Using Optimized Temporal Convolutional Networks
Published 2024“…This article introduces an efficient transient stability status prediction method based on deep temporal convolutional networks (TCNs). …”
-
395
Applications of fast fourier transform in the integrity evaluation of deep foundations
Published 2016“…The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …”
Get full text
Get full text
Get full text
Get full text
article -
396
Efficient Scalable VLSI Architecture for Montgomery Inversion in GF(p)
Published 2004“…We suggest a new correction phase for a previously proposed almost Montgomery inverse algorithm to calculate the inversion in hardware. We also propose an efficient hardware algorithm to compute the inverse by multi-bit shifting method. …”
Get full text
Get full text
article -
397
RFID localization using single reader antenna. (c2014)
Published 2016“…Our scheme is based on Power Map Matching algorithm. The proposed method employs the use of a Single Stationary Reader Antenna and multitags placed on the asset. …”
Get full text
Get full text
masterThesis -
398
Impacts of Feeder Reconfiguration on Renewable Resources Allocation in Balanced and Unbalanced Distribution Systems
Published 2016“…In this article, network reconfiguration and distributed generation allocation in distribution networks are dealt with simultaneously while imposing an objective of minimizing energy loss. The proposed method, which is based on a genetic algorithm, takes into consideration the uncertainty related to renewable distributed generation output power and the load variability. …”
Get full text
article -
399
Reconfigured Photovoltaic Model to Facilitate Maximum Power Point Tracking for Micro and Nano-Grid Systems
Published 2022“…This enables the use of a simple Perturb and Observe (P&O) algorithm to easily track GMPP. For reconfiguration, a simple 5 × 5 PV array is considered, and a new physical relocation procedure based on the position square method is proposed. …”
-
400
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”