Search Results - (( co detection method algorithm ) OR ( based operational based algorithm ))
Search alternatives:
- based operational »
- operational based »
- method algorithm »
- co detection »
-
1
FPGA Implementation of Multi-User Detection Genetic Algorithm Tool for SDMA-OFDM Systems
Published 2016“…Robust multi-user detection (MUD) methods based on space division multiple access (SDMA) techniques are essential to efficiently exploit the electromagnetic spectrum. …”
Get full text
Get full text
Article -
2
-
3
Enhancing CI engine performance and emission control using a hybrid RSM–Rao algorithm for ZnO-doped castor–neem biodiesel blends
Published 2025“…Traditional optimization methods, like Response Surface Methodology (RSM) alone, have failed to capture the complexities of engine operation, leading to the adoption of a more efficient algorithmic approach that requires no algorithm-specific parameters. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Design and development of an intuitive desktop application for rapid SARS-CoV-2 diagnosis using electrochemical potentiostat
Published 2023“…Our primary focus revolved around creating a user-friendly desktop application, seamlessly integrating an algorithm that automates result generation for operators. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Gas inspector mobile robot as carbon monoxide source finder
Published 2015“…For sensing unit, an array of three di↵erent kinds of semiconductor sensors of TGS series are used to detect the CO, which are inexpensive and commercially available. …”
Get full text
Get full text
Thesis -
7
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2024journal::journal article -
8
Cloud Co-Residency Denial of Service Threat Detection Inspired by Artificial Immune System
Published 2024“…This research also proposed a method in detecting co-residency attacks. In this paper the co-residency attack detection model was proposed and tested until satisfactory results were obtained with the datasets. …”
Proceedings Paper -
9
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2018“…This research also proposed a method in detecting co-residency attacks. In this paper the co-residency attack detection model was proposed and tested until satisfactory results were obtained with the datasets. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Detecting space-time disease clusters with arbitrary shapes and sizes using a co-clustering approach
Published 2017“…To address this problem, a new algorithm is proposed, which uses a co-clustering strategy to detect prospective and retrospective space-time disease clusters with no restriction on shape and size. …”
Get full text
Get full text
Article -
11
Advanced chirped spectral modulation technique and particle swarm optimization algorithms for effective indoor air pollution detection and monitoring
Published 2025“…The use of PSO and CSM altogether allowed for detecting carbon dioxide CO2, carbon monoxide CO, and nitrogen dioxide NO2 down to 10?…”
Article -
12
-
13
Multiplex real-time PCR detection of respiratory viruses in lower respiratory tract infections in children
Published 2018“…Molecular methods detect more viral aetiologies than conventional methods, with simultaneous detection of multiple respiratory viruses. …”
Get full text
Get full text
Get full text
Article -
14
A self-tuning filter-based adaptive linear neuron approach for operation of three-level inverter-based shunt active power filters under non-ideal source voltage conditions
Published 2017“…However, no work has been conducted to study its performance under non-ideal source voltage conditions. In this work, a STF-based fundamental voltage extraction algorithm is integrated with an ADALINE algorithm, serving as synchronizer algorithm to ensure in-phase operation of the generated reference current with the non-ideal source voltage. …”
Get full text
Get full text
Article -
15
A novel hybrid edge detection algorithm based on wavelet thresholding and ICA
Published 2012Get full text
Working Paper -
16
Reservoir operation based on evolutionary algorithms and multi-criteria decision-making under climate change and uncertainty
Published 2018“…The reliability, resiliency, and vulnerability indices, based on a multi-criteria model, were used to select the base method for reservoir operation. …”
Get full text
Get full text
Article -
17
-
18
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-base chains are provided with and without doubling operation. …”
Get full text
Get full text
Thesis -
19
Enhanced genetic algorithm optimization model for a single reservoir operation based on hydropower generation: case study of Mosul reservoir, northern Iraq
Published 2016“…The first algorithm was based on the traditional simulation of reservoir operation, whilst the second algorithm (Salg) enhanced the GAOM by changing the population values of GA through a new simulation process of reservoir operation. …”
Get full text
Get full text
Get full text
Article -
20
BASE: a bacteria foraging algorithm for cell formation with sequence data
Published 2010“…In addition, a newly developed BFA-based optimization algorithm for CF based on operation sequences is discussed. …”
Get full text
Get full text
Get full text
Article
