يعرض 501 - 520 نتائج من 667 نتيجة بحث عن '(((( data models algorithm ) OR ( based testing algorithm ))) OR ( elements method algorithm ))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 501

    Corona power loss computation in bundled bipolar conductors حسب Al-Hamouz, Z.M.

    منشور في 2000
    "…In this paper, a finite element (FE) based algorithm devoted for the computation of the corona current and hence the corona power loss associated with bundled bipolar high voltage direct current (HVDC) conductors is presented. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 502

    Multi-Model Investigation and Adaptive Estimation of the Acoustic Release of a Model Drug From Liposomes حسب Wadi, Ali

    منشور في 2019
    "…Unbiased drug-release estimates are realized by implementing an online noise identification algorithm. The algorithm is first deployed in a simulated environment in which it was rigorously tested and compared with the correct solution. …"
    احصل على النص الكامل
    article
  3. 503
  4. 504

    Approximate XML structure validation technical report حسب Tekli, Joe

    منشور في 2014
    "…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 505

    Particle swarm optimization approach for protein structure prediction in the 3D HP model حسب Mansour, Nashat

    منشور في 2012
    "…To test our algorithm, we used two sets of benchmark sequences of different lengths and compared our results to published results. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 506

    High-order parametrization of the hypergeometric-Meijer approximants حسب Abouzeid M. Shalaby (16329062)

    منشور في 2023
    "…We also show that such extension of the hypergeometric resummation algorithm is able to employ non-perturbative information like strong-coupling and large-order asymptotic data which are always used to accelerate the convergence. …"
  7. 507
  8. 508

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura, Habiba

    منشور في 2023
    "…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 509

    Computation of conformal invariants حسب Mohamed M.S., Nasser

    منشور في 2020
    "…We compare the performance and accuracy to previous results in the cases when numerical data is available and also in the case of several model problems where exact results are available.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 510

    A METHODOLOGY FOR NETWORK TOPOLOGY DESIGN USING FUZZY EVALUATIONS حسب Khan, Salman A.

    منشور في 2020
    "…In this paper, we present a methodology to address design issues. This methodology is based on two algorithms, namely, fuzzy simulated evolution algorithm and the augmenting path algorithm. …"
    احصل على النص الكامل
    article
  11. 511

    Validation of plasma protein glycation and oxidation biomarkers for the diagnosis of autism حسب Aisha Nasser J. M. Al-Saei (17885957)

    منشور في 2023
    "…In 2018 we reported a discovery study of a blood biomarker diagnostic test for ASD based on a combination of four plasma protein glycation and oxidation adducts. …"
  12. 512
  13. 513
  14. 514

    A novel hybrid methodology for fault diagnosis of wind energy conversion systems حسب Khaled Dhibi (16891524)

    منشور في 2023
    "…Therefore, a hybrid feature selection based diagnosis technique, that can preserve the advantages of wrapper and filter algorithms as well as RF model, is proposed. In the first phase, the neighborhood component analysis (NCA) filter algorithm is used to reduce and select only the pertinent features from the original raw data. …"
  15. 515

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology حسب Al-Hemairy, Moh'd Hussain

    منشور في 2010
    "…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
    احصل على النص الكامل
  16. 516

    Strategies for Reliable Stress Recognition: A Machine Learning Approach Using Heart Rate Variability Features حسب Mariam Bahameish (19255789)

    منشور في 2024
    "…To account for limitations associated with small datasets, robust strategies were implemented based on methodological recommendations for ML with a limited dataset, including data segmentation, feature selection, and model evaluation. …"
  17. 517

    Reconfigured Photovoltaic Model to Facilitate Maximum Power Point Tracking for Micro and Nano-Grid Systems حسب J. Prasanth Ram (19499062)

    منشور في 2022
    "…The I–V characteristics of conventional and reconfigured models are programmed into the simulator and the use of the hill climbing algorithm is validated. To analyze the voltage and power oscillations with MPP tracking, the PSO algorithm is also tested for two test patterns and its results are comprehensively studied.…"
  18. 518

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura Habiba (17808302)

    منشور في 2023
    "…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
  19. 519

    Uplink Noma in UAV-Assisted IoT Networks حسب Mrad, Ali

    منشور في 2022
    "…The first part of the thesis considers the problem of data collection from time-constrained IoT devices through deploying a UAV with uplink NOMA. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  20. 520

    CNN feature and classifier fusion on novel transformed image dataset for dysgraphia diagnosis in children حسب Jayakanth Kunhoth (14158908)

    منشور في 2023
    "…Among the task-specific models, the SVM trained on word data achieved the highest accuracy of 91.7%. …"