Search alternatives:
using algorithm » cosine algorithm (Expand Search)
update » updated (Expand Search)
using algorithm » cosine algorithm (Expand Search)
update » updated (Expand Search)
-
281
Design of adaptive arrays based on element position perturbations
Published 1993“…The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …”
Get full text
Get full text
article -
282
Convergence and steady-state analysis of the normalized least mean fourth algorithm
Published 2007“…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …”
article -
283
Convergence and steady-state analysis of the normalized least mean fourth algorithm
Published 2007“…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …”
Get full text
article -
284
Incorporation of Robust Sliding Mode Control and Adaptive Multi-Layer Neural Network-Based Observer for Unmanned Aerial Vehicles
Published 2024“…The MLNN observer, employing a modified back-propagation algorithm, is used for the quadrotor’s state estimation. …”
-
285
-
286
A Genetic Algorithm for Improving Accuracy of Software Quality Predictive Models
Published 2010“…In this work, we present a genetic algorithm to optimize predictive models used to estimate software quality characteristics. …”
Get full text
Get full text
Get full text
article -
287
Novel Peak Detection Algorithms for Pileup Minimization in Gamma Ray Spectroscopy
Published 2006“…This study uses the above facility in developing algorithms for digitally determining the basic pulse parameters and tackling the problem of pulse pile-up in Gamma-ray spectroscopy. …”
Get full text
Get full text
article -
288
A parallel optimization algorithm for the maximum clique problem. (c2008)
Published 2008Get full text
Get full text
masterThesis -
289
Efficient heuristic algorithms for influence propagation in social networks. (c2018)
Published 2018“…Then we introduce the notion of an influence propagation function and use it to design an efficient algorithm across all types of networks. …”
Get full text
Get full text
Get full text
masterThesis -
290
Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms
Published 2022“…The outcomes revealed that these ML algorithms can be useful in predicting ground losses during wild blueberry harvesting in the selected fields.…”
-
291
Evolutionary algorithms, simulated annealing and tabu search: a comparative study
Published 2020“…The termevolutionary algorithmis used to refer to any probabilistic algorithmwhose design is inspired by evolutionary mechanisms found in biological species. …”
Get full text
article -
292
A novel design technique for generating building form
Published 2018“…The theoretical framework of the technique was successfully tested out and validated by implementing it over serious of examples that are categorized into three groups: examples directed to test out the proposed variables in each process, examples directed to validate the ability of whole technique to generate forms for a hypothetical project requirements and examples of scripting the mechanisms using the algorithmic editor interface and the visual programming language Grasshopper incorporated with Rhinoceros 3D software."…”
Get full text
-
293
Design and analysis of efficient and secure elliptic curve cryptoprocessors.
Published 2006“…Elliptic Curve Cryptosystems have attracted many researchers and have been included in many standards such as IEEE, ANSI, NIST, SEC and WTLS. The ability to use smaller keys and computationally more efficient algorithms compared with earlier public key cryptosystems such as RSA and ElGamal are two main reasons why elliptic curve cryptosystems are becoming more popular. …”
Get full text
masterThesis -
294
Framework for rapid design and optimisation of immersive battery cooling system
Published 2025“…Two key parameters are optimised, namely: battery gap spacing (3–10 mm) and inlet/outlet width (5–15 mm), via Optimal Latin Hypercube Sampling, Support Vector Regression, and GDE3 algorithm. Palm biodiesel is used as a dielectric coolant in the proposed system to preserve LIB temperature within 20–40°C, preventing thermal runaway and ensuring a lightweight BTMS design. …”
-
295
-
296
A new tabu search algorithm for the long-term hydro scheduling problem
Published 2002“…The algorithm is based on using the short-term memory of the tabu search (TS) approach to solve the nonlinear optimization problem in continuous variables of the LTHSP. …”
Get full text
Get full text
article -
297
Wearable wrist to finger photoplethysmogram translation through restoration using super operational neural networks based 1D-CycleGAN for enhancing cardiovascular monitoring
Published 2024“…TTR-GAN comprises cascaded dual-stage 1D Cycle Generative Adversarial Networks (1D-CycleGANs) constructed using Super-ONNs. In the first phase, corrupted wPPG waveforms are blindly restored using a 1D-CycleGAN-based restoration framework. …”
-
298
UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks
Published 2018“…To this end, we propose the utilization of Unmanned Aerial Vehicles (UAVs) to collect data in dense wireless sensor networks (WSNs) using projection-based Compressive Data Gathering (CDG) as a novel solution methodology. …”
Get full text
Get full text
Get full text
Get full text
article -
299
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models
Published 2024“…Moreover, the DBRF classification model is deployed to categorize the normal and attacking data flows using optimized features. Here, the proposed DRF-DBRF security model's performance is validated and tested using five different and popular IoT benchmarking datasets. …”
-
300
LaScaDa: A Novel Scalable Topology for Data Center Network
Published 2020“…LaScaDa forwards packets between nodes using a new hierarchical row-based routing algorithm. …”