Search alternatives:
processing algorithm » processing algorithms (Expand Search)
rd algorithm » _ algorithms (Expand Search)
elements rd » elements _ (Expand Search)
processing algorithm » processing algorithms (Expand Search)
rd algorithm » _ algorithms (Expand Search)
elements rd » elements _ (Expand Search)
-
421
MoveSchedule
Published 1995“…MoveSchedule is validated using realistic project data and its solution is qualitatively assessed by an experienced engineer on that project.…”
Get full text
Get full text
Get full text
masterThesis -
422
-
423
-
424
Intelligent route to design efficient CO<sub>2</sub> reduction electrocatalysts using ANFIS optimized by GA and PSO
Published 2022“…Accordingly, a dataset containg 258 data points was extracted from the DFT method to use in machine learning method. …”
-
425
-
426
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
Published 2019“…Therefore, for this paper multiple machine learning algorithms are investigated to predict system failure based on vehicle trips information as well as maintenance management historical data including preventive maintenance and corrective maintenance. …”
Get full text
-
427
Modelling of pollutant transport in compound open channels
Published 1998“…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …”
Get full text
Get full text
masterThesis -
428
Scatter search for homology modeling
Published 2016“…However this technique suffers from poor initial target-template alignments. To improve homology based PSP, we propose a scatter search (SS) metaheuristic algorithm. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
429
Tracking and repairing damaged healthcare databases using the matrix
Published 2015“…The algorithm is based on data dependency and uses a single matrix. …”
Get full text
Get full text
Get full text
Get full text
article -
430
MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks
Published 2009“…This paper introduces a message forwarding algorithm for search applications within mobile ad hoc networks that is based on the concept of selecting the nearest node from a set of designated nodes. …”
Get full text
Get full text
Get full text
Get full text
article -
431
Information warfare
Published 2017“…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
Get full text
Get full text
Get full text
Get full text
article -
432
Detecting and Predicting Archaeological Sites Using Remote Sensing and Machine Learning—Application to the Saruq Al-Hadid Site, Dubai, UAE
Published 2023“…The modelling and prediction accuracies are expected to improve with the insertion of a neural network and backpropagation algorithms based on the performed cluster groups following more recent field surveys. …”
Get full text
-
433
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …”
Get full text
Get full text
Get full text
article -
434
Improving INS/GPS Integration for Mobile Robotics Applications
Published 2008Get full text
doctoralThesis -
435
A multi-pretraining U-Net architecture for semantic segmentation
Published 2025“…The proposed approach makes advantage of data augmentation to generate newly synthesized images, which are subsequently processed using a watershed mask. …”
-
436
SemIndex: Semantic-Aware Inverted Index
Published 2017“…We provide here a new approach, called SemIndex, that extends the standard inverted index by constructing a tight coupling inverted index graph that combines two main resources: a general purpose semantic network, and a standard inverted index on a collection of textual data. We also provide an extended query model and related processing algorithms with the help of SemIndex. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
437
Information Warfare
Published 2015“…The algorithm is based on data dependency and uses a single matrix that will be later used during recovery.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
438
Edge intelligence for network intrusion prevention in IoT ecosystem
Published 2023“…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …”
-
439
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
Published 2010“…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
Get full text
-
440
Optimum Track to Track Fusion Using CMA-ES and LSTM Techniques
Published 2024“…The first method uses an offline technique based on a global optimizer called the CMA-ES algorithm and the second one uses LSTM in its different forms to learn the online adjustment of the fusion weights between the two tracks. …”
Get full text