Search alternatives:
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
-
301
The use of configurable computing for computational kernels in scientific simulations
Published 2006“…We present algorithms and analysis for two such kernels: fast, problem-specific multipliers and the efficient evaluation of Taylor series. …”
Get full text
Get full text
Get full text
article -
302
Plant disease detection using drones in precision agriculture
Published 2023“…Color-infrared (CIR) images are the most preferred data used and field images are the main focus. The machine learning algorithm applied most is convolutional neural network (CNN). …”
-
303
Transmission Line Fault Location Using Unsynchronized Measurements
Published 2013Get full text
doctoralThesis -
304
Fuzzy controllers design using space-filling curves
Published 1998“…The SFC fuzzy model is then used to design a fuzzy controller. The proposed method achieves a dramatic reduction of the complexity of fuzzy controller by reducing the multivariable fuzzification problem to a one dimensional space…”
Get full text
Get full text
article -
305
Fuzzy Controllers Design Using Space-Filling Curves
Published 2020“…The SFC fuzzy model is then used to design a fuzzy controller. The proposed method achieves a dramatic reduction of the complexity of fuzzy controller by reducing the multivariable fuzzification problem to a one dimentional space.…”
Get full text
article -
306
Cyberbullying Detection in Arabic Text using Deep Learning
Published 2023“…Therefore, this study aims to evaluate several versions of Recurrent Neural Networks (RNNs) and Feedforward Neural Networks (FNNs) for detecting cyberbullying in the Arabic language. Although these algorithms are widely used in text classification and outperform the performance of classical classifiers, many have been extensively investigated in other domains such as sentiment analysis and dialect identification, as well as cyberbullying detection in English text. …”
Get full text
-
307
-
308
A METHODOLOGY FOR NETWORK TOPOLOGY DESIGN USING FUZZY EVALUATIONS
Published 2020“…This methodology is based on two algorithms, namely, fuzzy simulated evolution algorithm and the augmenting path algorithm. …”
Get full text
article -
309
A method for data path synthesis using neural networks
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
310
Scheduling and allocation in high-level synthesis using stochastic techniques
Published 2020“…Scheduling and allocation can be formulated as an optimization problem. In this work, a unique approach to scheduling and allocation problem using the genetic algorithm (GA) is described. …”
Get full text
article -
311
Mobile robots obstacles avoidance using dynamic window approach
Published 2018Get full text
doctoralThesis -
312
RFID localization using single reader antenna. (c2014)
Published 2016“…The use of RSSI has proven to be a cheap solution to the Localization problem since no additional hardware is required, other than the receiver itself. …”
Get full text
Get full text
masterThesis -
313
-
314
Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach
Published 2023“…<p dir="ltr">The problem of formation tracking control for a group of quadcopters with nonlinear dynamics using Barrier Lyapunov Functions (BLFs) is studied in this paper where the quadcopters are following a desired predefined trajectory in a predefined formation shape. …”
-
315
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
Published 2020“…TIDCS-A proposes a dynamic algorithm to compute the exact time for nodes cleansing states and restricts the exposure window of the nodes. …”
-
316
Accommodating High Penetrations of Renewable Distributed Generation Mix in Smart Grids
Published 2017Get full text
doctoralThesis -
317
-
318
-
319
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…This research aims to analyze the reliability and efficiency of data mining techniques in detecting and preventing fraud in the procurement sector in the UAE and globally. The method used in this research is a classification of models and algorithms used in data mining. …”
Get full text
-
320