Search alternatives:
processing algorithm » processing algorithms (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
systems using » system using (Expand Search)
Showing 781 - 800 results of 994 for search '(((( data processing algorithm ) OR ( systems using algorithm ))) OR ( elements data algorithm ))', query time: 0.10s Refine Results
  1. 781
  2. 782

    High-order parametrization of the hypergeometric-Meijer approximants by Abouzeid M. Shalaby (16329062)

    Published 2023
    “…<p>In this work, we introduce an extension to the hypergeometric algorithm we developed before for the resummation of divergent series.The extension overcome the time-consuming problem we face in the parametrization process of the hypergeometric approximants. …”
  3. 783
  4. 784
  5. 785
  6. 786
  7. 787

    A Multistage Passive Islanding Detection Method for Synchronous-Based Distributed Generation by Sawas, Abdullah M.

    Published 2021
    “…In this article, the proposed classifier is trained and tested using a database of feature vectors, obtained using PSCAD, which were designed to reflect a variety of commonly encountered events on an IEEE 34-bus distribution system. …”
    Get full text
    article
  8. 788

    A map matching approach for train positioning. Part I: Development and analysis by Saab, Samer S.

    Published 2000
    “…This paper is devoted to the development of a map matching algorithm for a train positioning system. Due to the nonsteerable truck design associated with rail vehicles, rail track curvatures are reasonably small. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  9. 789

    The monotone circuit value problem with bounded genus is in NC by Abu-Khzam, Faisal N.

    Published 2017
    “…We present an efficient parallel algorithm for the general Monotone Circuit Value Problem (MCVP) with n gates and an underlying graph of bounded genus k. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  10. 790
  11. 791
  12. 792

    A geometric-primitives-based compression scheme for testingsystems-on-a-chip by El-Maleh, A.

    Published 2001
    “…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data…”
    Get full text
    Get full text
    article
  13. 793

    Accurate multiple network alignment through context-sensitive random walk by Hyundoo Jeong (3840013)

    Published 2015
    “…In this work, we propose a novel multiple network alignment algorithm based on a context-sensitive random walk model. …”
  14. 794

    Multi-Agent Learning of Strategies in Abstract Argumentation Mechanisms by Nemer, Rama

    Published 2009
    “…This thesis aims to contribute to this general problem by examining the behavior of adaptive self-interested agents, in a multi-agent environment,over repeated encounters using game-theoretic techniques. I extended an existing simulation tool to implement argumentation games and used it to run repeated game experiments using combinations of characteristic argumentation games, adapted from literature, and types of adaptive agents under different conditions.The theme used was that of a court setting whereby there is a judge listening to arguments from different agents. …”
    Get full text
  15. 795
  16. 796
  17. 797
  18. 798

    ON-LINE IDENTIFICATION AND CONTROL THROUGH SERIES CONVERTER VOLTAGE OF A UNIFIED POWER FLOW CONTROLLER by Rahim, A.H.M.A

    Published 2006
    “…Self-tuning adaptive control of the voltage magnitude of the series converter for stabilization of a power system is presented in this paper. The plant parameters are identified through a regressive least square algorithm and the stabilizing control is derived through a pole-shifting technique using the adaptive plant model. …”
    Get full text
    article
  19. 799

    An expandable Montgomery modular multiplication processor by Gutub, A.A.A.

    Published 1999
    “…Several public-key cryptographic systems (Schneier, 1996) make heavy use of modular multiplication. …”
    Get full text
    Get full text
    article
  20. 800

    The Role of Artificial Intelligence in Decoding Speech from EEG Signals: A Scoping Review by Uzair Shah (15740699)

    Published 2022
    “…The study selection process was carried out in three phases: study identification, study selection, and data extraction. …”