بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
systems using » system using (توسيع البحث)
data finding » data mining (توسيع البحث), data hiding (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
systems using » system using (توسيع البحث)
data finding » data mining (توسيع البحث), data hiding (توسيع البحث)
-
141
Consensus-Based Distributed Formation Control of Multi-Quadcopter Systems: Barrier Lyapunov Function Approach
منشور في 2023"…The method is firstly developed in a centralized scheme and then extended to a distributed framework using appropriate asymptotically convergent consensus algorithms. …"
-
142
Wearable Real-Time Heart Attack Detection and Warning System to Reduce Road Accidents
منشور في 2019"…The system consists of two subsystems that communicate wirelessly using Bluetooth technology, namely, a wearable sensor subsystem and an intelligent heart attack detection and warning subsystem. …"
-
143
Conceptualisation study for using RFID as a stand-alone vehicle positioning system
منشور في 2009"…This paper examines the possibility for using RFID technology as a complete stand-alone vehicle positioning system. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
144
A system for sign language recognition using fuzzy object similarity tracking
منشور في 2005"…In this paper, we have presented a system that performs vision based isolated Arabic sign language recognition using hidden Markov models together with EM algorithm for parameters estimation. …"
احصل على النص الكامل
احصل على النص الكامل
article -
145
-
146
-
147
A multiobjective optimization method for the SOC Test Time, TAM, and power optimization using a strength pareto evolutionary algorithm
منشور في 2017"…This paper presents a multiobjective optimization approach for the SOC test scheduling problem. The method uses a Strength Pareto Evolutionary Algorithm that minimizes the overall test application time in addition to power, wrapper design and TAM assignment. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
148
-
149
-
150
-
151
Fast Transient Stability Assessment of Power Systems Using Optimized Temporal Convolutional Networks
منشور في 2024"…The proposed algorithm is evaluated on the 68-bus system and the Northeastern United States 25k-bus synthetic test system with credible contingencies using the PowerWorld simulator. …"
-
152
Modeling and Identification of Nonlinear DC Motor Drive Systems Using Recurrent Wavelet Networks
منشور في 2013احصل على النص الكامل
doctoralThesis -
153
Definition and selection of fuzzy sets in genetic‐fuzzy systems using the concept of fuzzimetric arcs
منشور في 2008"…An irregular shape may be required by some systems. Hence, a genetic algorithm was proposed as a methodology to optimize the performance of fuzzy systems by mutating different regular shapes. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
154
-
155
Evolutionary Algorithms for VLSIMultiobjective Netlist Partitioning
منشور في 2006احصل على النص الكامل
article -
156
Bee Colony Algorithm for Proctors Assignment.
منشور في 2015"…This problem is intractable, and hence, heuristics algorithms are needed to find good solutions. In this paper, we propose a new solution for the proctor assignment problem based on the Bee Colony meta-heuristic algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
157
Efficiency Optimization of a Standalone Solar Energy System using Fuzzy Based MPPT
منشور في 2012احصل على النص الكامل
doctoralThesis -
158
Threshold sequencing algorithms. (c2001)
منشور في 2001احصل على النص الكامل
احصل على النص الكامل
masterThesis -
159
Optimal Sizing and Techno-Economic Analysis of Hybrid Renewable Energy Systems—A Case Study of a Photovoltaic/Wind/Battery/Diesel System in Fanisau, Northern Nigeria
منشور في 2020"…In the first step, the MATLAB environment was used to run simulations and optimize the system via the genetic algorithm. …"
-
160
Android Malware Detection Using Machine Learning
منشور في 2024"…The results of this work can be used to build more robust systems to protect devices and networks from malicious attacks.…"
احصل على النص الكامل
article