Search alternatives:
method algorithm » mould algorithm (Expand Search)
taking algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
defined » designed (Expand Search)
method algorithm » mould algorithm (Expand Search)
taking algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
defined » designed (Expand Search)
-
81
The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions
Published 2022“…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
-
82
A Terrain classification system for coseismic landslide hazard analysis: Lebanon, a case study
Published 2014“…Terrain classification was modeled after the work of Iwahashi and Pike (2007), which has been shown to relate to engineering properties of the landscape (eg Vs 30, Yong et al., 2012) using slope, curvature, and roughness. In this work topographic slope, calculated using Ritter’s algorithm (1987) is used to demarcate landslide failure modes. …”
Get full text
Get full text
Get full text
conferenceObject -
83
An Improved Genghis Khan Optimizer based on Enhanced Solution Quality Strategy for Global Optimization and Feature Selection Problems
Published 2024“…Feature selection (FS) is the activity of defining the most contributing feature subset among all used features to improve the superiority of datasets with a large number of dimensions by selecting significant features and eliminating redundant and irrelevant ones. …”
Get full text
-
84
AGEomics Biomarkers and Machine Learning—Realizing the Potential of Protein Glycation in Clinical Diagnostics
Published 2022“…AGEomics biomarkers have been used in diagnostic algorithms using machine learning methods. …”
-
85
Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles
Published 2000“…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …”
Get full text
Get full text
Get full text
article -
86
-
87
Design and analysis of efficient and secure elliptic curve cryptoprocessors.
Published 2006“…Elliptic Curve Cryptosystems have attracted many researchers and have been included in many standards such as IEEE, ANSI, NIST, SEC and WTLS. The ability to use smaller keys and computationally more efficient algorithms compared with earlier public key cryptosystems such as RSA and ElGamal are two main reasons why elliptic curve cryptosystems are becoming more popular. …”
Get full text
masterThesis -
88
Vibration suppression in a cantilever beam using a string-type vibration absorber
Published 2017“…The string is rigidly connected to the fixed end of the beam and through a spring and damper to a second point on the beam. The finite element method is used to model the system and a reduced order model is obtained through modal reduction performed on both the string and the beam. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
89
Genetic Fuzzimetric Technique (GFT)
Published 2012“…Integration of fuzzy systems with genetic algorithm has been identified by researchers as a useful technique of optimizing systems under uncertainty. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
90
Common weaving approach in mainstream languages for software security hardening
Published 2013“…Finally, we explore the viability and the relevance of our propositions by applying the defined approach for systematic security hardening to develop case studies.…”
Get full text
Get full text
Get full text
article -
91
Crown Structures for Vertex Cover Kernelization
Published 2007“…Crown structures in a graph are defined and shown to be useful in kernelization algorithms for the classic vertex cover problem. …”
Get full text
Get full text
Get full text
article -
92
Video surveillance using deep transfer learning and deep domain adaptation: Towards better generalization
Published 2023“…While artificial intelligence (AI) smooths the path of computers to think like humans, machine learning (ML) and deep learning (DL) pave the way more, even by adding training and learning components. …”
-
93
A new minimum curvator multi-step method for unconstrained optimization
Published 1998“…In this paper, we carry on with a similar idea and define a rational model with a free parameter. Our derivation of the new algorithm is based on determining some value of the parameter that minimizes the curvature in some chosen metric. …”
Get full text
Get full text
Get full text
conferenceObject -
94
-
95
Data Redundancy Management in Connected Environments
Published 2020“…Connected environments are typically defined as physical infrastructures (e.g., building) equipped with sensors that produce and exchange raw data. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
96
A geographic information system method to generate long term regional solar radiation resource maps: enhancing decision-making
Published 2024“…The regression-kriging algorithm and its variants are used to calibrate satellite data, through interpolation of ground solar radiation data. …”
-
97
Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying
Published 2023“…Many efforts have been deployed by the IR community to extend freetext query processing toward semi-structured XML search. Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …”
Get full text
Get full text
Get full text
Get full text
article -
98
-
99
Next-generation energy systems for sustainable smart cities: Roles of transfer learning
Published 2022“…These algorithms might not perform as expected, take much time in training, or do not have enough input data to generalize well. …”
-
100
Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials
Published 1997“…High resolution signal processing techniques involving higher-order statistics (HOS) and artificial neural networks (ANN) which re useful in ultrasonic nondestructive evaluation (NDE) of materials systems subject to additive white Gaussian noise (AWGN) and masking effects of measurement systems used and propagation paths, are investigated in this Thesis. The proposed techniques are: i) a batch-type deconvolution method using the complex bicepstrum algorithm, and ii) automatic ultrasonic defect classification system using a modular learning strategy. …”
Get full text
masterThesis