Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
update » updated (Expand Search)
Showing 381 - 400 results of 608 for search '(((( data processing algorithm ) OR ( designed using algorithm ))) OR ( element update algorithm ))', query time: 0.12s Refine Results
  1. 381

    Energy-Aware QoS Uplink Scheduling for UGS Traffic Flows in WiMAX Networks by Noorani, Sanabel

    Published 2014
    “…We used Voice-over-IP (VoIP) traffic connection models for UGS traffic flows to simulate and validate algorithm. …”
    Get full text
    article
  2. 382
  3. 383
  4. 384

    A Multistage Passive Islanding Detection Method for Synchronous-Based Distributed Generation by Sawas, Abdullah M.

    Published 2021
    “…In this article, the proposed classifier is trained and tested using a database of feature vectors, obtained using PSCAD, which were designed to reflect a variety of commonly encountered events on an IEEE 34-bus distribution system. …”
    Get full text
    article
  5. 385

    ENUMERATIVE TECHNIQUES IN TOPOLOGICAL OPTIMIZATION OF COMPUTER NETWORKS SUBJECT TO FAULT TOLERANCE AND RELIABILITY by Abd-El-barr, Mostafa

    Published 2002
    “…Experimental results obtained from a set of randomly generated networks using the proposed algorithms are presented and compared to those obtained using the existing techniques [1], [2]. …”
    Get full text
    article
  6. 386
  7. 387

    Tabu Search For A Class Of Single-Machine Scheduling Problems by Al-Turki, Umar

    Published 2020
    “…Problems from the literature are used to test the performance of the algorithm. This algorithm can be used for solving other problems such as minimizing completion time deviation from a common due date.…”
    Get full text
    article
  8. 388
  9. 389

    A novel hybrid methodology for fault diagnosis of wind energy conversion systems by Khaled Dhibi (16891524)

    Published 2023
    “…Feature selection pre-processing is an important step to increase the accuracy of the classification algorithm and decrease the dimensionality of a dataset. …”
  10. 390

    Logic-based Benders decomposition combined with column generation for mobile 3D printer scheduling problem by Tao Li (86810)

    Published 2025
    “…After analyzing the characteristics and structure of the model, a logic-based Benders decomposition algorithm framework is designed for solving this problem. …”
  11. 391

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura, Habiba

    Published 2023
    “…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
    Get full text
    Get full text
    Get full text
    article
  12. 392

    Vehicular-OBUs-As-On-Demand-Fogs by Sami, Hani

    Published 2020
    “…For instance, real-time vehicular applications require fast processing of the vast amount of generated data by vehicles in order to maintain service availability and reachability while driving. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  13. 393

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura Habiba (17808302)

    Published 2023
    “…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
  14. 394
  15. 395

    Information warfare. (c2015) by Sai, Mohamed El

    Published 2015
    “…Numerous damage assessment and recovery algorithms have been proposed by researchers. In this work we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
    Get full text
    Get full text
    masterThesis
  16. 396

    A Novel Internal Model Control Scheme for Adaptive Tracking of Nonlinear Dynamic Plants by Khan, T.

    Published 2006
    “…The use of U-model alleviates the computational complexity of on-line nonlinear controller design that arises when using other modelling frame works such as NARMAX model. …”
    Get full text
    Get full text
    article
  17. 397

    Information warfare by Haraty, Ramzi A.

    Published 2017
    “…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  18. 398

    Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials by Ghouti, Lahouari

    Published 1997
    “…However, the improved performance is achieved at the expense of higher computational complexity and data requirements.…”
    Get full text
    masterThesis
  19. 399

    Fast force-directed/simulated evolution hybrid for multiobjective VLSI cell placement by Sait, Sadiq M.

    Published 2004
    “…In this work, a fast hybrid algorithm is designed to address this problem. The algorithm employs simulated evolution (SE), an iterative search heuristic that comprises three steps: evaluation, selection and allocation. …”
    Get full text
    Get full text
    article
  20. 400

    Adaptive controlled superconducting magnetic energy storage devices for performance enhancement of wind energy systems by Rania A., Turky

    Published 2023
    “…This research paper introduces the Generalized Continuous Mixed P-Norm Sub-Band Adaptive Filtering (GCMPNSAF) algorithm, designed for efficient online control of Superconducting Magnetic Energy Storage Devices (SMESDs) in Wind Energy Systems (WESs). …”
    Get full text
    Get full text
    Get full text
    article