يعرض 1 - 5 نتائج من 5 نتيجة بحث عن 'algorithm etc technologies', وقت الاستعلام: 0.04s تنقيح النتائج
  1. 1

    A hybrid model for the optimum integration of renewable technologies in power generation systems حسب Poullikkas, Andreas

    منشور في 2011
    "…The optimization model developed uses a genetic algorithm (GA) technique for the calculation of both the additional cost of electricity due to the penetration of RES-E technologies as well as the required RES-E levy in the electricity bills in order to fund this RES-E penetration. …"
    احصل على النص الكامل
    article
  2. 2

    Solar power forecasting beneath diverse weather conditions using GD and LM-artificial neural networks حسب Sharma, Neetan

    منشور في 2023
    "…The proposed ANN based algorithm has been used for unswerving petite term forecasting. …"
    احصل على النص الكامل
  3. 3

    Social Network Analysis for Precise Friend Suggestion for Twitter by Associating Multiple Networks Using ML حسب Dharmendra Kumar Singh Singh (19517710)

    منشور في 2022
    "…<p dir="ltr">The main aim in this paper is to create a friend suggestion algorithm that can be used to recommend new friends to a user on Twitter when their existing friends and other details are given. …"
  4. 4

    Definition and selection of fuzzy sets in genetic‐fuzzy systems using the concept of fuzzimetric arcs حسب Kouatli, Issam

    منشور في 2008
    "…Other shapes may also be selected using the described formula (trapezoidal, triangular, … , etc.). As the proposal methodology is based on the trigonometric circle, other trigonometric formulae can be applied. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 5

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…<p dir="ltr">With the rapid miniaturization in sensor technology, ruddervator, arduino, and multi-rotor system, drone technology has fascinated researchers in the field of network security. …"