787 results found.
Year: 2010, Volume: 10, Issue: 4
... estimation using back-propagation have been collected during the period January 1, 2009 to error algorithm. Meanwhile, there exist other types of fuzzy December 31, 2009 from ... is observed that 2-D FIR filters act more accurately in comparison with 1-D conventional fuzzy algorithms that are used to a great extent [13-15]. representations; however ...
Terms matched: 2 - Score: 27 - 2,187k
Year: 2018, Volume: 18, Number: 2
... a regular TCP user. account. Third, load balancing; a multi-path TCP algorithm should C. Multi-path Cubic (MPCUBIC) transfer traffic away from congested paths ... Algorithm (LIA) convex growth functions. During congestion avoidance, Several congestion control algorithms have been MPCUBIC regulates traffic by adjusting the sending proposed for MPTP. Four ...
Terms matched: 2 - Score: 27 - 1,620k
Year: 2014, Volume: 14, Number: 1
... suggested items are those that users with together for a long time so that the algorithm is able to similar preferences have liked in the past. This converge. ... collaborative and The proposed solution takes into account the differences content based filtering. The algorithms developed estimate the between these two services and implements distinct similarity between items and ...
Terms matched: 2 - Score: 27 - 785k
Year: 2016, Volume: 16, Number: 4
... image data. Besides, it will be an based uploading mechanism to optimize slice algorithm. And awful experience with intolerable time-delay when users they proposed a real-time slicing ... geographic information systems, indexing, provide tile service rapidly for massive raster dataset parallel algorithms, spatial resolution, tiles. becomes an urgent problem to be solved technically ...
Terms matched: 2 - Score: 26 - 1,439k
Year: 2016, Volume: 16, Number: 2
... response based on the that the higher number of steps the user makes before Algorithm 1: reaching the exit position, longer the time he requires to respond ... classification (the set of images) to one of the responses based on simple algorithms, computer security, human factors. rules and his secret password. I ...
Terms matched: 2 - Score: 26 - 1,341k
Year: 2017, Volume: 17, Number: 2
... in practice. The presented environment [24]. The presented concept for intelligent algorithm extends on the standard RLSE method by nodes on autonomous DC systems takes inspiration ... measurements in switching power supplies and application tracking of linear time-variant systems by extended RLS algorithms," of measured data to stability analysis", IEEE Applied Power IEEE ...
Terms matched: 2 - Score: 26 - 1,453k
Year: 2019, Volume: 19, Number: 3
... , the individual trees via shape analysis. Zhong et al. [30] algorithm may fail when the data gaps on tree stem do extracted individual trees according ... solution. Then, real clusters are recovered individual trees. by applying the k-means algorithms to the rows of these vectors. If instead we use the normalized graph ...
Terms matched: 2 - Score: 26 - 1,020k
Year: 2011, Volume: 11, Number: 2
... a congested TCP/AQM dynamics. By employing a Lyapunov-Krasovski router, the AQM algorithm computes a marking probability, functional, sufficient stochastic stability conditions are p. ... property of high quality with random parameters. The linear dynamic model of TCP AQM algorithms. See For example [3, 10, 11 and 12]. ...
Terms matched: 2 - Score: 24 - 623k
Year: 2015, Volume: 15, Number: 1
... we in arbitrary coordinate systems. Thus, a preliminary propose and validate a novel algorithm to construct a pseudo- supermesh able to approximate both, the source and ... entire for 3D object metamorphosis, represented by closed triangular morphing sequence. Most parameterization algorithms, meshes. The systems returns a high quality transition sequence, existent in ...
Terms matched: 2 - Score: 24 - 2,370k
Year: 2015, Volume: 15, Number: 4
... are computed The evolution of only one of these states, a scalar using the algorithm described in [16], and compared to the temporal data series, ... . cryptanalysis also. An analysis with respect to the security and performance of such algorithms is made in [11]. I. INTRODUCTION AND PROBLEM STATEMENT Furthermore ...
Terms matched: 2 - Score: 24 - 1,104k