Search alternatives:
implementing control » implementing iot (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
em algorithm » deer algorithm (Expand Search)
elements em » elements _ (Expand Search), elementi per (Expand Search)
implementing control » implementing iot (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
em algorithm » deer algorithm (Expand Search)
elements em » elements _ (Expand Search), elementi per (Expand Search)
-
81
Recursive Parameter Identification Of A Class Of Nonlinear Systems From Noisy Measurements
Published 2020“…The model structure is made up of two linear dynamic elements separated by a nonlinear static one. The nonlinear element is assumed to be of the polynomial type with known order; The identification is based on input/output data where the output is contaminated with measurement noise. …”
Get full text
article -
82
A hybrid approach for XML similarity
Published 2007“…Various algorithms for comparing hierarchically structured data, e.g. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
83
Morphology for Planar Hexagonal Modular Self-Reconfigurable Robotic Systems
Published 2009Get full text
doctoralThesis -
84
On the complexity of multi-parameterized cluster editing
Published 2017“…In other words, Cluster Editing can be solved efficiently when the number of false positives/negatives per single data element is expected to be small compared to the minimum cluster size. …”
Get full text
Get full text
Get full text
Get full text
article -
85
Starvation Problem in CPU Scheduling for Multimedia Systems
Published 2002“…In this paper, we briefly describe three of the popular multimedia scheduling algorithms. We compare and discuss how adequate each algorithm is in handling the issue of starvation. …”
Get full text
article -
86
-
87
A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study
Published 2022“…Finally, a 3D Finite Element simulation was conducted to validate the findings and each observation resulting from the experiments. …”
Get full text
-
88
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
Published 2019“…Historical data of Dubai Toll Collection System is utilized to investigate multiple machine learning algorithms. …”
Get full text
-
89
Applications of fast fourier transform in the integrity evaluation of deep foundations
Published 2016“…The widespread use of drilled shafts and the large and critical nature of loads they carry make post-construction quality control a rather important aspect of inspections. …”
Get full text
Get full text
Get full text
Get full text
article -
90
Real-Time Path-Planning using Depth/INS Sensor Fusion for Localization
Published 2019Get full text
doctoralThesis -
91
Machine Learning Techniques for Detecting Attackers During Quantum Key Distribution in IoT Networks With Application to Railway Scenarios
Published 2021“…An architecture for implementing QKD in beyond 5G IoT networks is proposed, offloading the heavy computational tasks to IoT controllers. …”
-
92
New aspect-oriented constructs for security hardening concerns
Published 2009“…Moreover, we show the viability and correctness of the proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the result of explanatory case studies.…”
Get full text
Get full text
Get full text
article -
93
Impact Of Inspection Errors On The Performance Measures Of A General: Repeat Inspection Plan
Published 2020“…The impact of the errors is studied by conducting sensitivity analysis on the errors utilizing computer software which implements an algorithm that determines the optimal parameters of the model of the plan. …”
Get full text
article -
94
Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité
Published 2009“…Moreover, we show the viability and correctness of our proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the results of explanatory case studies.…”
Get full text
Get full text
Get full text
article -
95
-
96
Scheduling and allocation in high-level synthesis using stochastic techniques
Published 2020“…Both genetic scheduling and allocation (GSA) and tabu scheduling and allocation (TSA) have been tested on various benchmarks and results obtained for data-oriented control-data flow graphs are compared with other implementations in the literature. …”
Get full text
article -
97
Efficiency Optimization of a Standalone Solar Energy System using Fuzzy Based MPPT
Published 2012Get full text
doctoralThesis -
98
Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique
Published 2024“…<p dir="ltr">Blockchain technology enables users to control and record their cryptocurrency transactions through the use of digital wallets. …”
-
99
-
100
Modeling and Control of a Thermally Driven MEMS Actuator for RF Applications
Published 2017Get full text
doctoralThesis