بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
modelling algorithm » scheduling algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
processing algorithm » processing algorithms (توسيع البحث)
modelling algorithm » scheduling algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
-
381
Enhanced DC Microgrid Protection: a Neural Network and Wavelet Transform Approach
منشور في 2024احصل على النص الكامل
doctoralThesis -
382
Topology and parameter estimation in power systems through inverter-based broadband stimulations
منشور في 2015"…This study describes a method for identifying parameters associated with the power system model. In particular, the proposed algorithm in this study addresses the line parameter and topology identification task in the scope of state estimation. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
383
Improving Rule Set Based Software Quality Prediction
منشور في 2003احصل على النص الكامل
احصل على النص الكامل
article -
384
Recursive Parameter Identification Of A Class Of Nonlinear Systems From Noisy Measurements
منشور في 2020"…A model is proposed to identify the parameters of a class of stochastic nonlinearsystems. …"
احصل على النص الكامل
article -
385
Parallel processing
منشور في 2005"…Parallel algorithms, based on simulated annealing, neural networks and genetic algorithms, for mapping irregular data to multicomputers are presented and compared. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
386
-
387
A modified coronavirus herd immunity optimizer for capacitated vehicle routing problem
منشور في 2021"…To evaluate the modified CHIO, twosets of data sets are used: the first data set has ten Synthetic CVRP models while the second is an ABEFMPdata set which has 27 instances with different models. …"
احصل على النص الكامل
-
388
Cross entropy error function in neural networks
منشور في 2002"…To forecast gasoline consumption (GC), the ANN uses previous GC data and its determinants in a training data set. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
389
-
390
An Infrastructure-Assisted Workload Scheduling for Computational Resources Exploitation in the Fog-Enabled Vehicular Network
منشور في 2020"…A Dantzig–Wolfe decomposition algorithm is proposed which yields to a master program solvable by the Barrier algorithm and subproblems solve...…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
391
A geographic information system method to generate long term regional solar radiation resource maps: enhancing decision-making
منشور في 2024"…Digital surface model data is used as an auxiliary variable to further scale down to 30 m resolution. …"
-
392
From Collatz Conjecture to chaos and hash function
منشور في 2023"…By incorporating the Collatz process and carefully considering key-controlled variables, the proposed model aims to offer enhanced security properties while meeting the necessary criteria for a reliable and effective hashing mechanism. …"
-
393
Scheduling and allocation in high-level synthesis using stochastic techniques
منشور في 2020"…High-level synthesis is the process of automatically translating abstract behavioral models of digital systems to implementable hardware. …"
احصل على النص الكامل
article -
394
Positive Unlabelled Learning to Recognize Dishes as Named Entity
منشور في 2019"…With the lack of labelled data, I try to overcome the cold start and avoid manual labelling by building a lookup table from a dictionary. …"
احصل على النص الكامل
-
395
A hybrid approach for XML similarity
منشور في 2007"…Various algorithms for comparing hierarchically structured data, e.g. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
396
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
منشور في 2021"…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…"
-
397
Exploring Digital Competitiveness through Bayesian Belief Networks
منشور في 2025"…The methodology involves constructing BBN models using data from the IMD Digital Competitiveness Ranking 2023 for 64 countries. …"
احصل على النص الكامل
article -
398
EEG-Based Multi-Modal Emotion Recognition using Bag of Deep Features: An Optimal Feature Selection Approach
منشور في 2019"…Features extracted from the proposed BoDF model have considerably smaller dimensions. The proposed model achieves better classification accuracy compared to the recently reported work when validated on SJTU SEED and DEAP data sets. …"
-
399
Predicting COVID-19 cases using bidirectional LSTM on multivariate time series
منشور في 2022"…Unlike other forecasting techniques, our proposed approach first groups the countries having similar demographic and socioeconomic aspects and health sector indicators using K-means clustering algorithm. The cumulative case data of the clustered countries enriched with data related to the lockdown measures are fed to the bidirectional LSTM to train the forecasting model. …"
-
400
Process Mining over Unordered Event Streams
منشور في 2020"…This requires online algorithms that, instead of keeping the whole history of event data, work incrementally and update analysis results upon the arrival of new events. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل