Showing 101 - 120 results of 208 for search '(((( complex system algorithm ) OR ( movement data algorithm ))) OR ( level coding algorithm ))', query time: 0.13s Refine Results
  1. 101

    State-of-Charge Estimation Using Triple Forgetting Factor Adaptive Extended Kalman Filter for Battery Energy Storage Systems in Electric Bus Applications by Mena S. ElMenshawy (17983807)

    Published 2025
    “…Nevertheless, considering system complexity and computational efforts, the suggested SoC estimate techniques fall short of providing optimal filtering performance with high noise levels. …”
  2. 102
  3. 103

    Wide area monitoring system operations in modern power grids: A median regression function-based state estimation approach towards cyber attacks by Haris M. Khalid (17017743)

    Published 2023
    “…The system was affected with multiple system disturbances and severe data-injection attacks. …”
  4. 104
  5. 105

    Online Control and Optimization of Directional Drilling by unknown

    Published 2020
    “…Directional Steering System (DSS) has been established for well drilling in the oilfield in order to accomplish high reservoir productivity and to improve accessibility of oil reservoirs in complex locations. …”
    Get full text
    masterThesis
  6. 106
  7. 107

    ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks by Muhammad Asif Khan (7367468)

    Published 2022
    “…Two well-known problems related to device mobility are handover prediction and access point selection. Due to the complex nature of the radio environment, analytical models may not characterize the wireless channel, which makes the solution of these problems very difficult. …”
  8. 108

    Impact of Charging Electric Vehicles under Different State of Charge Levels and Extreme Conditions by Claude Ziad El-Bayeh (17542284)

    Published 2021
    “…Once these constraints are violated, the optimization algorithm might not work correctly and might not converge to a feasible solution, especially when the complexity of the system increases and includes nonlinearities. …”
  9. 109

    A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security by Shitharth Selvarajan (14157976)

    Published 2024
    “…Therefore, the proposed work aims to develop a Decentralized Identifiable Distributed Ledger Technology‐Blockchain (DIDLT‐BC) framework that is intelligent and effective, requiring the least amount of computing complexity to ensure cloud IoT system safety. In this case, the Rabin algorithm produces the digital signature needed to start the transaction. …”
  10. 110

    A hybrid Harris Hawks optimizer for economic load dispatch problems by Al-Betar, Mohammed Azmi

    Published 2022
    “…ELD is an important problem in power systems that is tackled by finding the optimal schedule of the generation units that minimize fuel conceptions under a set of constraints. …”
    Get full text
  11. 111

    Adaptive PPO With Multi-Armed Bandit Clipping and Meta-Control for Robust Power Grid Operation Under Adversarial Attacks by Mohamed Massaoudi (16888710)

    Published 2025
    “…However, maintaining high operational stability is increasingly challenging due to evolving grid complexities and potential adversarial threats. This paper proposes a novel composite enhanced proximal policy optimization (CePPO) algorithm to improve power grid operation under adversarial conditions. …”
  12. 112
  13. 113

    Exposure of Botnets in Cloud Environment by Expending Trust Model with CANFES Classification Approach by Nagendra Prabhu Selvaraj (17542041)

    Published 2022
    “…Further, back-off features are extracted from the particular node and all these structures are trained and categorized with a Co-Active Neuro Fuzzy Expert System (CANFES) classifier. The performance of the proposed bot detection system in the internet environment is analyzed latency, detection rate, packet delivery ration, energy availability and precision.…”
  14. 114
  15. 115

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector by AL HAMMADI, SUMAYYA ABDULLA

    Published 2022
    “…Procurement is an extensive and complex sector in the manufacturing industry, and has attracted an extensive and wide-spreading fraud that directly impacts the operation of an organization and economy at large. …”
    Get full text
  16. 116

    Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring by Muzna Yumman (16494023)

    Published 2020
    “…<p>The revolutionary idea of asymmetric cryptography brings a fundamental change to our modern communication system. However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. …”
  17. 117

    Adaptive temperature control of a reverse flow process by using reinforcement learning approach by A. Binid (22046054)

    Published 2024
    “…It should be mentioned that this approach is not reliant on the internal dynamics of the CFRR system, which is a complex process and is most effectively modeled using Partial Differential Equations (PDEs). …”
  18. 118
  19. 119

    ECG Signal Reconstruction on the IoT-Gateway and Efficacy of Compressive Sensing Under Real-Time Constraints by Mohammed Al Disi (16855407)

    Published 2018
    “…However, it is usually associated with computational complexity at the decoding end, increasing the latency of the system. …”
  20. 120

    A comprehensive review of deep reinforcement learning applications from centralized power generation to modern energy internet frameworks by Sakib Mahmud (15302404)

    Published 2025
    “…<p>The energy internet (EI) is evolving toward decentralized, data-rich, and time-critical operation, where legacy optimization often fails to meet complexity, scalability, and real-time constraints. …”