Search alternatives:
processing algorithm » processing algorithms (Expand Search)
per algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
based control » case control (Expand Search)
elements per » elementi per (Expand Search), elements _ (Expand Search)
processing algorithm » processing algorithms (Expand Search)
per algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
based control » case control (Expand Search)
elements per » elementi per (Expand Search), elements _ (Expand Search)
-
521
From Collatz Conjecture to chaos and hash function
Published 2023“…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
-
522
Quality Degradation And Pricing of Perishable Food Products
Published 2024Get full text
doctoralThesis -
523
MoveSchedule
Published 1995“…MoveSchedule is validated using realistic project data and its solution is qualitatively assessed by an experienced engineer on that project.…”
Get full text
Get full text
Get full text
masterThesis -
524
Framework for rapid design and optimisation of immersive battery cooling system
Published 2025“…A conjugate heat transfer model for a 3S2P pouch cell module (20 Ah LiFePO₄) is developed and validated against experimental data (< 2% error). The CFD model of a battery module is developed to train an ultra-fast metamodel for battery geometry optimisation. …”
-
525
-
526
Intelligent route to design efficient CO<sub>2</sub> reduction electrocatalysts using ANFIS optimized by GA and PSO
Published 2022“…Accordingly, a dataset containg 258 data points was extracted from the DFT method to use in machine learning method. …”
-
527
Real-Time Implementation of GPS Aided Low Cost Strapdown Inertial Navigation System
Published 2009Get full text
doctoralThesis -
528
CEAP
Published 2016“…The first challenge is related to the highly mobile nature of vehicles that complicates the processes of monitoring, buffering, and analyzing observations on these vehicles as they are continuously moving and changing their locations. …”
Get full text
Get full text
Get full text
Get full text
article -
529
Designing Cellular Mobile Networks Using Non{Deterministic Iterative Heuristics
Published 2020“…This work focuses on the problem of assigning cells to switches, which comprise the Base Station Controller and Mobile Switching Center, in a cellular mobile network. …”
Get full text
article -
530
-
531
AI-Based Methods for Predicting Required Insulin Doses for Diabetic Patients
Published 2015“…The performance of the three algorithms is evaluated on a data set found in the public UCMI repository.…”
Get full text
Get full text
article -
532
A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications
Published 2011“…The proposed scheme monitors the signal strength level during the file transfer process and compresses data blocks on-the-fly only whenever energy reduction gain is expected. …”
Get full text
Get full text
Get full text
article -
533
Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects
Published 2023“…The situation may cause concern and trepidation about integrating AI technologies and lack understanding of their optimal deployment and operation. Construction data management and integration are difficult. AI algorithms depend on data for training and analysis. …”
Get full text
-
534
Comprehensive whole genome sequence analyses yields novel genetic and structural insights for Intellectual Disability
Published 2017“…The <i>de novo</i> assembly resulted in unmasking hidden genome instability that was missed by standard re-alignment based algorithms. We also interrogated regulatory sequence variation for known and hypothesized ID genes and present useful strategies for WGS data analyses for non-coding variation.…”
-
535
Growing hierarchical self-organizing map for filtering intrusion detection alarms
Published 2008Get full text
Get full text
Get full text
Get full text
conferenceObject -
536
Dynamic single node failure recovery in distributed storage systems
Published 2017“…We selected fractional repetition coding due to its simple repair mechanism that minimizes the repair and disk access bandwidths together with the property of un-coded repair process. To minimize the system repair cost, we formulate our problem using incidence matrices and solve it heuristically using genetic algorithms for all possible cases of single node failures. …”
Get full text
Get full text
Get full text
Get full text
article -
537
ISSP
Published 2017“…Many decision-support tools were developed to assist planners in space scheduling but these were limited to providing the user with a platform that ties spatial and temporal data in the project and left it up to the user to decide on positions of resources and schedule adjustments to solve spatial conflicts that may arise in the process of constructing site layouts over time.The ISSP system, presented here, provides a graphical user-interactive interface with underlying layout and scheduling algorithms that construct feasible layout and schedule solutions under 2-dimensional spatial constraints between resources. …”
Get full text
Get full text
Get full text
conferenceObject -
538
The use of semantic-based predicates implication to improve horizontal multimedia database fragmentation
Published 2007“…We particularly discuss multimedia primary horizontal fragmentation and focus on semantic-based textual predicates implication required as a pre-process in current fragmentation algorithms in order to partition multimedia data efficiently. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
539
Predicting insulin dosage for diabetic patients to reach optimal glucose levels. (c2012)
Published 2012Get full text
Get full text
masterThesis -
540