Search alternatives:
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data tracking » radar tracking (Expand Search)
tool using » tools using (Expand Search)
element » elements (Expand Search)
Showing 121 - 140 results of 199 for search '(((( data tracking algorithm ) OR ( tool using algorithm ))) OR ( element method algorithm ))', query time: 0.11s Refine Results
  1. 121

    AUTOMATIC WEINBERGER ARRAY SYNTHESIS FROM UAHPL DESCRIPTION by Sait, Sadiq M.

    Published 2020
    “…The system also minimizes the area required by the WA by performing row compaction. An algorithm similar to that used for channel routing is employed for compaction (Hashimoto and Stevens 1971). …”
    Get full text
    article
  2. 122
  3. 123

    A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem by Habchi, Wassim

    Published 2008
    “…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …”
    Get full text
    Get full text
    Get full text
    article
  4. 124

    Video features with impact on user quality of experience by Abbas, Nadine

    Published 2021
    “…After collecting the QoE assessments, the supervised training data set is developed and imported into Rapid-Miner data mining tool. The feature evaluation is performed first using forward elimination feature selection algorithm, and second using decision tree classification to extract and sort the features that highly affect the subjective QoE. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  5. 125
  6. 126

    Multi-Agent Learning of Strategies in Abstract Argumentation Mechanisms by Nemer, Rama

    Published 2009
    “…This thesis aims to contribute to this general problem by examining the behavior of adaptive self-interested agents, in a multi-agent environment,over repeated encounters using game-theoretic techniques. I extended an existing simulation tool to implement argumentation games and used it to run repeated game experiments using combinations of characteristic argumentation games, adapted from literature, and types of adaptive agents under different conditions.The theme used was that of a court setting whereby there is a judge listening to arguments from different agents. …”
    Get full text
  7. 127

    A Literature Review on System Dynamics Modeling for Sustainable Management of Water Supply and Demand by Khawar Naeem (17984062)

    Published 2023
    “…The solution approaches included the genetic algorithm (GA), particle swarm optimization (PSO), and the non-dominated sorting genetic algorithm (NSGA-II). …”
  8. 128

    Enhanced Deep Belief Network Based on Ensemble Learning and Tree-Structured of Parzen Estimators: An Optimal Photovoltaic Power Forecasting Method by Mohamed Massaoudi (16888710)

    Published 2021
    “…The hyper-parameters of the proposed stacking ensemble are carefully tuned using the tree-structured of parzen estimators algorithm to achieve top-notch predictive performance. …”
  9. 129

    Transaction Dependency Based Approach for Database Damage Assessment Using a Matrix by Haraty, Ramzi Ahmed

    Published 2017
    “…The proposed algorithm keeps track of the transactions that read from one another and store this information in a single matrix. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 130

    A novel on design and implementation of hybrid MPPT controllers for solar PV systems under various partial shading conditions by Chakarajamula Hussaian Basha (21633167)

    Published 2024
    “…The proposed system is investigated by using the MATLAB/Simulink tool.</p><h2>Other Information</h2><p dir="ltr">Published in: Scientific Reports<br>License: <a href="https://creativecommons.org/licenses/by/4.0" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1038/s41598-023-49278-9" target="_blank">https://dx.doi.org/10.1038/s41598-023-49278-9</a></p>…”
  11. 131
  12. 132
  13. 133

    Communications in electronic textile systems by Nakad, Z.

    Published 2017
    “…Abstract- Electronic textiles (e-textiles) are emerging as a novel method for constructing electronic systems in wearable and large area applications. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  14. 134

    Sentiment analysis for Arabizi in social media. (c2015) by Tobaili, Taha

    Published 2015
    “…With approximately four million tweets posted daily in several Arabizi dialects, an informal Arabic whereby sentences are written using English alpha numerals e.g. Yalla 7abibi, it is very useful to have a data mining tool that can analyze the sentiment of Twitter users in the Arab world. …”
    Get full text
    Get full text
    masterThesis
  15. 135
  16. 136

    Optimisation of PV Cleaning Practices: Comparison Between Performance Based and Periodic Based Approaches by ALHAJERI, RASHED ABDULLA

    Published 2018
    “…It was also important to note that higher soiling did not correlate to higher cleaning requirements, as the cleaning was dependent not only on the soiling but on the PV output and cleaning costs. The algorithm was found to be an effective yet simple tool to help PV owners decide on cleaning procedures, however it does not take into account the effect of natural cleaning events. …”
    Get full text
  17. 137

    Inferential sensing techniques in industrial applications by Shakil,, Muhammad

    Published 0007
    “…System delays are obtained by approximating the model by a linear model. Genetic algorithm, which is a heuristic optimization technique, is used to ¯nd the system delays of the linear model, which are used in dynamical neural network model. …”
    Get full text
    masterThesis
  18. 138

    Artificial Intelligence in Predicting Cardiac Arrest: Scoping Review by Asma Alamgir (18288895)

    Published 2021
    “…K-fold cross-validation was the most used algorithm evaluation tool reported in the studies (24/47, 51%).…”
  19. 139

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology by Al-Hemairy, Moh'd Hussain

    Published 2010
    “…For instance, what so called the Man-in-the-Middle attack [MiM] and denial of services [DoS] are just some ways of vulnerable attacks to TCP/IP networks, using some tools available free on the internet. …”
    Get full text
  20. 140