Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
making algorithm » cosine algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
data modeling » data models (Expand Search), spatial modeling (Expand Search)
found making » mold making (Expand Search)
element » elements (Expand Search)
Showing 161 - 180 results of 455 for search '(((( data modeling algorithm ) OR ( found making algorithm ))) OR ( element method algorithm ))*', query time: 0.18s Refine Results
  1. 161

    Modeling and Bias-Robust Estimation of the Acoustic Release of Chemotherapeutics from Liposomes by Wadi, Ali

    Published 2019
    “…The results suggest that the proposed algorithm, the optimal Kalman filter, performs well in modeling acoustically activated drug release from liposomes.…”
    Get full text
    article
  2. 162

    Digital twin in energy industry: Proposed robust digital twin for power plant and other complex capital-intensive large engineering systems by Ahmad K. Sleiti (14778229)

    Published 2022
    “…Furthermore, this paper demonstrates the advantages of the developed ADL algorithm approach and DSM prediction of the DT using vector autoregressive model for anomaly detection in utility gas turbines with data from an operational power plant.…”
  3. 163

    Real-Time Performance Evaluation of a Genetic Algorithm Based Fuzzy Logic Controller for IPM Motor Drives by Nasir Uddin, M.

    Published 2005
    “…The proposed GFLC is developed to have less computational burden, which makes it suitable for real-time implementation. The parameters for the GFLC are tuned by genetic algorithm (GA). …”
    Get full text
    article
  4. 164

    Hardware Model of an Expandable RSA Cryptographic System by Gutub, Adnan

    Published 1998
    “…Data security is an important aspect of information transmission and storage in an electronic form. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  5. 165

    Modelling of pollutant transport in compound open channels by Chatila, Jean Georges

    Published 1998
    “…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …”
    Get full text
    Get full text
    masterThesis
  6. 166

    Multi-Objective Optimisation of Injection Moulding Process for Dashboard Using Genetic Algorithm and Type-2 Fuzzy Neural Network by Mohammad Reza Chalak Qazani (13893261)

    Published 2024
    “…Computational techniques, like the finite element method, are used to analyse behaviours based on varied input parameters. …”
  7. 167
  8. 168
  9. 169

    Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques by Ameema Zainab (16864263)

    Published 2020
    “…The obtained results illustrate the efficacy of the proposed algorithm to analyze the time series data from the IoT devices for spam detection.…”
  10. 170
  11. 171

    A Blockchain Model for Secure Communications in Internet of Vehicles by Mershad, Khaleel

    Published 2021
    “…In this paper, we present a framework for secure IoV communications by utilizing the High Performance Blockchain Consensus (HPBC) algorithm. Based on a previously published communication model for VANETs that uses an efficient routing protocol for transmitting packets between vehicles, we describe in this paper how to integrate a blockchain model on top of the IoV communications system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  12. 172

    Three approaches to modelling heating and evaporation of monocomponent droplets by Dmitrii V. Antonov (21225041)

    Published 2024
    “…It is shown that the algorithm for the third approach predicts values which are close to the experimental data.…”
  13. 173

    A Hardware Model of an Expandable RSA Cryptogrsphic System by Gutub, Adnan

    Published 1998
    “…Data security is an important aspect of information transmission and storage in an electronic form. …”
    Get full text
    masterThesis
  14. 174

    Use data Mining Techniques to Predict Users’ Engagement on the Social Network Posts in The Period Before, During and After Ramadan by AL RAWASHDEH, HANEEN MOHAMMAD

    Published 2017
    “…Different classification algorithms were applied to the dataset using the Rapidminer tool. …”
    Get full text
  15. 175
  16. 176
  17. 177
  18. 178
  19. 179
  20. 180

    Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT by Arumugam K (18456690)

    Published 2021
    “…Specifically, Novel Supportive Twin Delayed DDPG trains the user model to authenticate specific regions. As it is considered one of the most open and scalable interacting platforms of information, it successfully helps in the positive transfer of different kinds of data between devices in more significant and local operations of the industry. …”