Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
mesh algorithm » deer algorithm (Expand Search), search algorithm (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
element » elements (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
mesh algorithm » deer algorithm (Expand Search), search algorithm (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
element » elements (Expand Search)
-
81
Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique
Published 2024“…<p dir="ltr">Blockchain technology enables users to control and record their cryptocurrency transactions through the use of digital wallets. …”
-
82
Morphology for Planar Hexagonal Modular Self-Reconfigurable Robotic Systems
Published 2009Get full text
doctoralThesis -
83
Applications of fast fourier transform in the integrity evaluation of deep foundations
Published 2016“…The widespread use of drilled shafts and the large and critical nature of loads they carry make post-construction quality control a rather important aspect of inspections. …”
Get full text
Get full text
Get full text
Get full text
article -
84
Real-Time Path-Planning using Depth/INS Sensor Fusion for Localization
Published 2019Get full text
doctoralThesis -
85
Impact Of Inspection Errors On The Performance Measures Of A General: Repeat Inspection Plan
Published 2020“…The impact of the errors is studied by conducting sensitivity analysis on the errors utilizing computer software which implements an algorithm that determines the optimal parameters of the model of the plan. …”
Get full text
article -
86
Oversampling techniques for imbalanced data in regression
Published 2024“…For tabular data, we also present the Auto-Inflater neural network, utilizing an exponential loss function for Autoencoders. …”
-
87
A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem
Published 2008“…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …”
Get full text
Get full text
Get full text
article -
88
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…The findings from this study will help implement a system that will significantly reduce fraud in the procurement sector. …”
Get full text
-
89
Scheduling and allocation in high-level synthesis using stochastic techniques
Published 2020“…Both genetic scheduling and allocation (GSA) and tabu scheduling and allocation (TSA) have been tested on various benchmarks and results obtained for data-oriented control-data flow graphs are compared with other implementations in the literature. …”
Get full text
article -
90
Efficiency Optimization of a Standalone Solar Energy System using Fuzzy Based MPPT
Published 2012Get full text
doctoralThesis -
91
-
92
Assessment of static pile design methods and non-linear analysis of pile driving
Published 2006“…Scientific advances in pile analysis have been made in recent decades but their implementation in the estimation of axial capacity has been slow. …”
Get full text
Get full text
Get full text
masterThesis -
93
-
94
-
95
-
96
Four quadrant robust quick response optimally efficient inverterfed induction motor drive
Published 1989“…The control algorithms developed are readily implementable with present-day microprocessors…”
Get full text
Get full text
article -
97
Autopilot Design and Commercial Autopilot Evaluation Using Flybarless Helicopter
Published 2014Get full text
doctoralThesis -
98
FPGA-Based Network Traffic Classification Using Machine Learning
Published 2019Get full text
doctoralThesis -
99
Starvation Problem in CPU Scheduling for Multimedia Systems
Published 2002“…In this paper, we briefly describe three of the popular multimedia scheduling algorithms. We compare and discuss how adequate each algorithm is in handling the issue of starvation. …”
Get full text
article -
100
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
Published 2021“…<p>The Internet-of-drones (IoD) environment is a layered network control architecture designed to maintain, coordinate, access, and control drones (or Unmanned Aerial vehicles UAVs) and facilitate drones' navigation services. …”