Search Results - (( parameters equalization based algorithm ) OR ( pattern detection path algorithm ))
Search alternatives:
- parameters equalization »
- pattern detection »
- detection path »
- path algorithm »
-
1
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…The suggested algorithm outperforms the competition in terms of improving path cost, smoothness, and search time. …”
Get full text
Thesis -
2
Animal voice recognition for identification (ID) detection system
Published 2011“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
3
Dog voice identification (ID) for detection system
Published 2012“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
4
Application of Bat Algorithm and Its Modified Form Trained with ANN in Channel Equalization
Published 2022“…An alternative approach to training neural network-based equalizers is to use metaheuristic algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
5
-
6
Optimal CC-CV charging of lithium-ion battery for charge equalization controller
Published 2023Conference Paper -
7
Feature extraction: hand shape, hand position and hand trajectory path
Published 2011Get full text
Get full text
Get full text
Book Chapter -
8
Improved power output forecastingtechnique for effective battery management in photovoltaic system / Utpal Kumar Das
Published 2019“…A PSO-based algorithm is adopted for the appropriate selection of dominated parameters of SVR-based model to achieve better performance. …”
Get full text
Get full text
Get full text
Thesis -
9
Reduced-rank technique for joint channel estimation in TD-SCDMA systems.
Published 2013“…We exploit the rank deficient of H to reduce the number of parameters that characterizes this matrix. The adopted reduced rank technique is based on singular value decomposition algorithm. …”
Get full text
Get full text
Article -
10
Enhanced Harris's Hawk algorithm for continuous multi-objective optimization problems
Published 2020“…Harris’s hawk multi-objective optimizer (HHMO) algorithm is a MOSIbased algorithm that was developed based on the reference point approach. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Reduced Rank Technique for Joint Channel Estimation and Joint Data Detection in TD-SCDMA Systems
Published 2012“…We exploit the rank deficient of H to reduce the number of parameters that characterizes this matrix. The adopted reduced rank technique is based on singular value decomposition algorithm. …”
Get full text
Get full text
Article -
12
Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems
Published 2013“…We exploit the rank deficient of H to reduce the number of parameters that characterizes this matrix. The adopted reduced rank technique is based on singular value decomposition algorithm. …”
Get full text
Get full text
Article -
13
-
14
-
15
Cellular Automata-based Algorithm for Liquid Diffusion Phenomenon Modeling using imaging technique
Published 2013“…Then, thousands of images, as the same number of original images, are created by the CA-based algorithm. In this study, the diffusion speed of the predicted LDP is also computed by using a mathematical proposed algorithm which is the Diffusion Speed Algorithm (DSA). …”
Get full text
Get full text
Thesis -
16
Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network
Published 2019“…In the proposed work, the focused problem is how to reduce the communication energy consumption and to avoid the routing hole problem by optimized routing algorithms. First, a routing hole detection algorithm is proposed prior to designing the routing protocol which decreases about 30 percent energy consumption rate, detection time and detection overhead. …”
Get full text
Get full text
Thesis -
17
-
18
Machine Learning Based Detection for Compromised Accounts on Social Media Networks
Published 2025“…Behavioral features include changes in posting frequency, interaction patterns, and location data. We employ machine learning algorithms to train models that can accurately classify accounts as compromised or legitimate based on these features. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
20
DESIGN AND DEVELOPMENT OF HIGH-ACCURACY MACHINE FOR WIRE BENDING
Published 2023“…Firstly, using the proposed bending machine, in which the proposed algorithm is applied. Secondly, using the bending machine implemented without applying the proposed algorithm. …”
Article
