بدائل البحث:
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
-
101
-
102
EEG Signal Processing for Medical Diagnosis, Healthcare, and Monitoring: A Comprehensive Review
منشور في 2023"…The development of novel sensors for EEG recording, digital signal processing algorithms, feature engineering, and detection algorithms increases the need for efficient diagnostic systems. …"
-
103
Modeling and Control of a Thermally Driven MEMS Actuator for RF Applications
منشور في 2017احصل على النص الكامل
doctoralThesis -
104
-
105
Online Control and Optimization of Directional Drilling
منشور في 2020"…Directional Steering System (DSS) has been established for well drilling in the oilfield in order to accomplish high reservoir productivity and to improve accessibility of oil reservoirs in complex locations. …"
احصل على النص الكامل
masterThesis -
106
-
107
ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks
منشور في 2022"…Two well-known problems related to device mobility are handover prediction and access point selection. Due to the complex nature of the radio environment, analytical models may not characterize the wireless channel, which makes the solution of these problems very difficult. …"
-
108
State-of-Charge Estimation Using Triple Forgetting Factor Adaptive Extended Kalman Filter for Battery Energy Storage Systems in Electric Bus Applications
منشور في 2025"…Nevertheless, considering system complexity and computational efforts, the suggested SoC estimate techniques fall short of providing optimal filtering performance with high noise levels. …"
-
109
Impact of Charging Electric Vehicles under Different State of Charge Levels and Extreme Conditions
منشور في 2021"…Once these constraints are violated, the optimization algorithm might not work correctly and might not converge to a feasible solution, especially when the complexity of the system increases and includes nonlinearities. …"
-
110
Wide area monitoring system operations in modern power grids: A median regression function-based state estimation approach towards cyber attacks
منشور في 2023"…The system was affected with multiple system disturbances and severe data-injection attacks. …"
-
111
Improving INS/GPS Integration for Mobile Robotics Applications
منشور في 2008احصل على النص الكامل
doctoralThesis -
112
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security
منشور في 2024"…Therefore, the proposed work aims to develop a Decentralized Identifiable Distributed Ledger Technology‐Blockchain (DIDLT‐BC) framework that is intelligent and effective, requiring the least amount of computing complexity to ensure cloud IoT system safety. In this case, the Rabin algorithm produces the digital signature needed to start the transaction. …"
-
113
A hybrid Harris Hawks optimizer for economic load dispatch problems
منشور في 2022"…Furthermore, the proposed algorithm is evaluated on two ELD real-world cases which are 6 units-1263 MW and 15units-2630 MW. …"
احصل على النص الكامل
-
114
Estimating Vehicle State by GPS/IMU Fusion with Vehicle Dynamics
منشور في 2013احصل على النص الكامل
doctoralThesis -
115
On Single Source Reachability Improvement
منشور في 2022احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
116
Mobile robots obstacles avoidance using dynamic window approach
منشور في 2018احصل على النص الكامل
doctoralThesis -
117
Exposure of Botnets in Cloud Environment by Expending Trust Model with CANFES Classification Approach
منشور في 2022"…Bots’ detection in the cloud environment is a complex process. The purpose of this study was to create a multi-layered architecture that could detect a variety of existing and emerging botnets. …"
-
118
-
119
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
منشور في 2022"…Procurement is an extensive and complex sector in the manufacturing industry, and has attracted an extensive and wide-spreading fraud that directly impacts the operation of an organization and economy at large. …"
احصل على النص الكامل
-
120
Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring
منشور في 2020"…<p>The revolutionary idea of asymmetric cryptography brings a fundamental change to our modern communication system. However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. …"