Techniques for computer
-
This paper aims to address this limitation by introducing techniques for estimating trustworthiness from a community context. These techniques rely on similarity measures or operators within the framework of path algebra.
8p viengfa 28-10-2024 2 2 Download
-
This paper introduces a new clustering technique based on granular computing. In tradional clustering algorithms, the integration of the high shaping capability of the existing datasets becomes fussy which in turn results in inferior functioning.
8p viling 11-10-2024 2 1 Download
-
In this study, we propose a novel approach using the oscillation characteristics of the RMS current as the input to machine learning models, combined with the confident learning technique. Using the oscillation characteristics obtained by taking a discrete Fourier transform (DFT) of the RMS current as model input, we aim to reduce the computational requirements of the machine learning models.
12p viling 11-10-2024 1 0 Download
-
In line with that research trend, this paper proposes a hybrid algorithm combining particle swarm optimization with the simulated annealing technique (PSO-SA) to optimize the length of intervals to improve forecasting accuracies.
19p vimurdoch 18-09-2023 11 4 Download
-
In this thesis, focus on the wireless links between devices equipped by deployed operating personnel and intermediary access point infrastructure. We use multi-radio (MR) platforms, wireless devices with multiple and diverse transceiver technologies, to produce robust and reliable links through adaptive control of available transceivers. Primarily, we study the application of intelligent control techniques, namely reinforcement learning (RL), for adaptive control over diverse transceivers to achieve the desired robustness and reliability under dynamic environmental conditions.
185p runthenight04 02-02-2023 7 2 Download
-
The document will be structured as follows: In Chapter 2 outline the methodology, discussing the computational techniques used to evaluate the interaction energies and evaluating the construction of the TT and D3(BJ) correction terms. Chapter 3 attempts to establish a foundational understanding of how these methods model vdW interactions by evaluating the performance of the corrected and uncorrected HF and DFT methods in comparison with CCSD(T) energies for a selection of inert gas dimers, and simple molecule-molecule interactions.
63p runthenight04 02-02-2023 9 2 Download
-
In this Masters thesis computational modelling techniques were employed to investigate iron-free apo-Lactoferrin (apo-Lf) structural conformation changes in the presence of variant temperature and pH. These conditions represent the environment most milk protein goes through in food processing and the production of food products.
162p runthenight04 02-02-2023 7 2 Download
-
The objectives are as follows a compact presentation of human actions: Joints in the skeleton model play different roles in each action. The first objective is to find action representations that are efficient for action recognition.
130p caphesuadathemchanh 29-03-2022 18 6 Download
-
Research objectives of the thesis: Research the theories of complex fuzzy sets, complex fuzzy logic and measures based on complex fuzzy sets; research and development of fuzzy inference system based on complex fuzzy sets; research applied techniques to reduce rules, optimize fuzzy rules in complex fuzzy inference system; research on how to represent rules based on fuzzy knowledge graphs to reduce inference computation time for the test set and deal with the cases where the new dataset is not present in the training data set.
27p beloveinhouse01 15-08-2021 15 4 Download
-
Privacy-preserving frequency mining is a quite simple technique, but it is very useful in privacy-preserving machine learning and data mining. In this paper, we construct an elliptic curve analog of the ElGamal system-based protocol for privacy-preserving frequency mining in fully distributed setting.
8p tamynhan9 02-12-2020 16 2 Download
-
his paper presents a method for all-digital background calibration of multiple channel mismatches including offset, gain and timing mismatches in time-interleaved analog-to-digital converters (TIADCs). The average technique is used to remove offset mismatch at each channel.
11p tamynhan6 14-09-2020 16 4 Download
-
Furthermore, experiments on the task of RE proved that data representation is one of the most influential factors to the model’s performance but still has many limitations. We propose a compositional embedding that combines several dominant linguistic as well as architectural features and dependency tree normalization techniques for generating rich representations for both words and dependency relations in the SDP
82p tamynhan1 13-06-2020 17 3 Download
-
Experimental and computational study on the effects of wearing neck collar on the carotid blood flow
The effect of football neck collar on the right external carotid blood flow was investigated for ten healthy subjects using Echo-Doppler technique and computational fluid dynamics (CFD) approach. Carotid is in charge of blooding head’s parts including the brain and eyes.
8p tohitohi 19-05-2020 18 1 Download
-
Therefore, goal of this work is to propose techniques to overcome the existing limitations in antenna array processing and snapshot processing for modern GNSS receivers. The proposed techniques not only reduce the implementation cost but also leverage the distributed data processing ability.
123p cotithanh000 07-10-2019 11 1 Download
-
In this paper we present two parallel algorithms for mining association rules that are well suited for distributed memory parallel computers. The algorithms are developed based on FP-growth method. The first algorithm is a task parallel formulation using a static load balancing technique. The second algorithm improves upon the first algorithm by dynamically balancing the load when the static task assignment leads to load imbalance.
17p binhminhmuatrenngondoithonggio 09-06-2017 45 4 Download
-
This paper presents new carrier-based PWM modulations to control this dual topology for optimum operation. In terms of power sources, this cascaded inverter is operated either from isolated dc sources (series power cells) or from a single dc source. Computational simulation and experimental validation are given to verify the proposed techniques.
11p binhminhmuatrenngondoithonggio 09-06-2017 44 2 Download
-
(BQ) This paper reports an intelligent approach for process modeling and optimization of electric discharge machining (EDM). Physics based process modeling using finite element method (FEM) has been integrated with the soft computing techniques like artificial neural networks (ANN) and genetic algorithm (GA) to improve prediction accuracy of the model with less dependency on the experimental data.
13p xuanphuongdhts 27-03-2017 56 2 Download
-
"Metric pattern cutting for women’s wear" presentation of content: Classic form cutting (The basic darted bodice blocks, from block to pattern, basic adaptations of the bodice blocks, sleeve adaptations ,...), flat cutting, size and fit, computer aided design (cad),
22p thuplato 17-05-2016 30 0 Download
-
In this chapter, students will be able to understand: Password policies ensure that users choose effective passwords; user-level security requires a separate account for each user; in share-level security, all users access shares by using the same passwords; a firewall is a hardware or software product that protects a network from unauthorized access, using techniques such as packet filtering, NAT, or proxy servers;...
15p tangtuy08 21-04-2016 35 3 Download
-
We describe Joshua (Li et al., 2009a)1 , an open source toolkit for statistical machine translation. Joshua implements all of the algorithms required for translation via synchronous context free grammars (SCFGs): chart-parsing, n-gram language model integration, beam- and cubepruning, and k-best extraction. The toolkit also implements suffix-array grammar extraction and minimum error rate training. It uses parallel and distributed computing techniques for scalability.
4p hongphan_1 15-04-2013 46 2 Download