Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
presented » present (Expand Search)
element » elements (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
presented » present (Expand Search)
element » elements (Expand Search)
-
401
An Intelligent and Low-Cost Eye-Tracking System for Motorized Wheelchair Control
Published 2020“…The first three techniques were automatic, employ correlation, and were variants of template matching, whereas the last one uses convolutional neural networks (CNNs). Different metrics to quantitatively evaluate the performance of each algorithm in terms of accuracy and latency were computed and overall comparison is presented. …”
-
402
A new estimator and approach for estimating the subpopulation parameters
Published 2021“…<p dir="ltr">Based on some theoretical results, we recommend a new algorithm for estimating the total and mean of a subpopulation variable for the case of a known subpopulation size, which is different from the algorithm recommended by most of sampling books. …”
-
403
Detecting latent classes in tourism data through response-based unit segmentation (REBUS) in Pls-Sem
Published 2016“…The research note is presented in two parts: Part A presents an overview of REBUS, including its development, algorithm, and its primary functions. …”
Get full text
Get full text
Get full text
Get full text
article -
404
A machine learning approach for localization in cellular environments
Published 2018“…This constitutes an improvement of 41%, 45%, and 16%, respectively, over the WKNN-only algorithm.…”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
405
Deadline-based connection setup in wavelength-routed WDM networks
Published 2010“…As such, this paper presents a novel approach that uses the optical connection setup time as a service differentiator during connection provisioning. …”
Get full text
Get full text
Get full text
article -
406
Robustness testing of composed real-time systems
Published 2010Get full text
Get full text
Get full text
Get full text
article -
407
On the parameterized parallel complexity and the vertex cover problem
Published 2016“…We initiate the study of FPPT with the well-known k-vertex cover problem. In particular, we present a parallel algorithm that outperforms the best known parallel algorithm for this problem: using O(m) instead of O(n2) parallel processors, the running time improves from 4logn+O(kk) to O(k⋅log3n) , where m is the number of edges, n is the number of vertices of the input graph, and k is an upper bound of the size of the sought vertex cover. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
408
A 3-D vision-based man-machine interface for hand-controlled telerobot
Published 2005“…To determine the three-dimensional (3-D) position a tracking algorithm based on uncalibrated cameras with weak perspective projection model is used. …”
Get full text
Get full text
article -
409
Wide area monitoring system operations in modern power grids: A median regression function-based state estimation approach towards cyber attacks
Published 2023“…To address this issue, a median regression function (MRF)-based state estimation is presented in this paper. The algorithm was stationed at each monitoring node using interacting multiple model (IMM)-based fusion architecture. …”
-
410
Weak-coupling, strong-coupling and large-order parametrization of the hypergeometric-Meijer approximants
Published 2020“…To test the validity of that constraint, we employed it to obtain the exact partition function of the zero-dimensional Ø<sup>4</sup> scalar field theory. The algorithm is also applied for the resummation of the ground state energies of Ø<sup>4</sup><sub>0+1</sub> and<sup>i</sup><sup>Ø</sup><sup>3</sup><sub>0+1</sub> scalar field theories. …”
-
411
A Software detector of the Wolff-Parkinson-White (WPW) Syndrome
Published 2000“…This paper presents a software package that has been developed to help physicians in detecting the existence of the Wolff-Parkinson-White (WPW) syndrome in a patient and the location of the accessory pathway in the human heart using D'Avilla's and Iturralde's algorithms. …”
Get full text
Get full text
Get full text
article -
412
Deep Reinforcement Learning for Resource Constrained HLS Scheduling
Published 2022“…The two main steps in HLS are: operations scheduling and data-path allocation. In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. …”
Get full text
Get full text
Get full text
masterThesis -
413
A Novel Deep Learning Technique for Detecting Emotional Impact in Online Education
Published 2022“…Promising results are achieved using both techniques, as presented in the Experimental Results Section. …”
Get full text
-
414
-
415
Validation of plasma protein glycation and oxidation biomarkers for the diagnosis of autism
Published 2023“…We conclude that ASD diagnosis may be supported using an algorithm with features of plasma protein CML, CMA, 3DG-H and DT in 5–12 years-old children, and an algorithm with additional features applicable for ASD screening in younger children. …”
-
416
On Single Source Reachability Improvement
Published 2022“…We show the NP hardness and present an effective polynomial-time greedy algorithm. …”
Get full text
Get full text
Get full text
masterThesis -
417
Recovery of business intelligence systems
Published 2018“…The execution time of the recovery process is a crucial factor for measuring the performance because it is directly proportional to the denial of service time of any healthcare system. This paper presents a high performance damage assessment and recovery algorithm for e-healthcare systems. …”
Get full text
Get full text
Get full text
Get full text
article -
418
A novel technique for fast multiplication
Published 2020“…In this paper we present the design of a new high-speed multiplication unit. …”
Get full text
article -
419
A pragmatic approach for testing robustness on real-time component based systems
Published 2005“…Each tester is dedicated to test a single SUT component. A test execution algorithm with an approach to handle testers coordination and execution delay is presented. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
420
Uplink Noma in UAV-Assisted IoT Networks
Published 2022“…Given the complexity of the problem and the incomplete knowledge about the environment, the problem is divided into two subproblems: the first models the UAV trajectory and the selection of the first device in the NOMA cluster at each time slot as a Markov Decision Process, and uses Proximal Policy Optimization to solve it. The second device is then selected using a heuristic algorithm based on prioritizing devices with higher bit rate requirements and strict deadlines. …”
Get full text
Get full text
Get full text
masterThesis