Search Results - (( wave location based algorithm ) OR ( web applications model algorithm ))
Search alternatives:
- applications model »
- web applications »
- model algorithm »
- wave location »
-
1
Evaluation of lightning location and lightning current wave shape using measured lightning magnetic fields at two stations
Published 2016“…In this paper, an algorithm is proposed to evaluate a lightning location as well as the lightning current wave shapes at different heights along a channel using lightning measured magnetic fields at two stations. …”
Get full text
Get full text
Conference or Workshop Item -
2
Differential equation fault location algorithm with harmonic effects in power system
Published 2023“…Based on the simulation results, the differential equation continuous wavelet technique (CWT) filter-based algorithm produced an accurate fault location result with a mean average error (MAE) of less than 5%.…”
Get full text
Get full text
Get full text
Article -
3
-
4
Quasi linear algorithm for modelling shoreline change from AIRSAR/POLSAR polarized data
Published 2007Get full text
Get full text
Conference or Workshop Item -
5
k- Nearest Neighbor Algorithm For Improving Accuracy In Clutter Based Location Estimation Of Wireless Nodes
Published 2013“…In step 2 we construct three triangles at random by using the data gathered in step 1 and calculate mean value of predicted locations. Finally based on locations calculated in step 2 we apply the k-NN algorithm to minimize error in the estimated location. …”
-
6
Web application vulnerabilities detection model
Published 2016“…The research will be carried out by using design string matching algorithm. The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
Get full text
Get full text
Research Reports -
7
Experimental studies on impact damage location in composite aerospace structures using genetic algorithms and neural networks
Published 2010“…This paper compares two advanced signal processing methods for impact location in composite aircraft structures. The first method is based on a modified triangulation procedure and Genetic Algorithms whereas the second technique applies Artificial Neural Networks. …”
Get full text
Get full text
Get full text
Article -
8
Validation of a 2D multispectral camera: Application to dermatology/cosmetology on a population covering five skin phototypes
Published 2011“…The flexibility of neural network based algorithm allows reconstruction at different wave ranges. …”
Get full text
Get full text
Conference or Workshop Item -
9
Evaluation of lightning return stroke current using measured electromagnetic fields
Published 2012“…This research proposed an inverse procedure algorithm using the proposed general fields’ expressions and the particle swarm optimization algorithm (PSO) in the time domain where the full channel base current wave shape in time domain can be determined. …”
Get full text
Get full text
Thesis -
10
Car dealership web application
Published 2022“…The web service performed model explaining and monitoring by querying the application data from the Azure SQL Database. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Detection of the onset of epileptic seizure signal from scalp EEG using blind signal separation
Published 2009“…The algorithm has been tested on epileptic EEG signals recorded from patients for detection of the onset of seizure waves and their origin within the brain.…”
Get full text
Article -
12
Cyberbullying detection: a machine learning approach
Published 2022“…Finally, the model was pickled and loaded into the web application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Dynamic modeling by usage data for personalization systems
Published 2009Get full text
Get full text
Conference or Workshop Item -
14
-
15
-
16
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…Online prediction is one Web Usage Mining application. However, the accuracy of the prediction and classification in the current architecture of predicting users' future requests systems can not still satisfy users especially in huge Web sites. …”
Get full text
Get full text
Article -
17
Secure radio telemetry and data acquisition using wireless data communication system with portable UHF transceivers / Mohd Dani Baba and Deepak Kumar Ghodgaonkar
Published 2003“…One of its main tasks is to acquire or collect data at remote location and send the data to a location either through cables or radio waves where the data can be received for evaluation and analysis. …”
Get full text
Get full text
Research Reports -
18
An optimized attack tree model for security test case planning and generation
Published 2018“…This paper presents an attack tree modeling algorithm for deriving a minimal set of effective attack vectors required to test a web application for SQL injection vulnerabilities. …”
Get full text
Get full text
Article -
19
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. …”
Get full text
Get full text
Get full text
Article -
20
Intelligent Web caching using neurocomputing and particle swarm optimization algorithm
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item
