Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
element » elements (Expand Search)
Showing 941 - 960 results of 1,002 for search '(((( data using algorithm ) OR ( based modeling algorithm ))) OR ( element method algorithm ))', query time: 0.12s Refine Results
  1. 941

    Effective dispatch strategies assortment according to the effect of the operation for an islanded hybrid microgrid by Sk.A. Shezan (21323048)

    Published 2022
    “…In HOMER software, all the possible dispatch algorithms were analyzed, and the power system responses and reliability study were carried out using DIgSILENT PowerFactory. …”
  2. 942
  3. 943

    Scrambled Prime Key Encryption by Haraty, Ramzi A.

    Published 2018
    “…To enhance data security different cryptographic algorithms are used. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  4. 944

    CAD TOOL FOR THE AUTOMATIC-GENERATION OF MICROPROGRAMS by Sait, Sadiq M.

    Published 2020
    “…Since the UAHPL model is directly related to hardware, this approach is better than those based on ordinary high-level languages or special microprogram languages. …”
    Get full text
    article
  5. 945

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
  6. 946

    Integrated whole transcriptome and small RNA analysis revealed multiple regulatory networks in colorectal cancer by Hibah Shaath (5599658)

    Published 2021
    “…IPA in combination with in silico prediction algorithms and experimentally validated databases gave insight into the complex associations and interactions between downregulated miRNAs and upregulated mRNAs in CRC and vice versa. …”
  7. 947

    A FeedForward–Convolutional Neural Network to Detect Low-Rate DoS in IoT by Harun Surej Ilango (17545728)

    Published 2022
    “…LR DoS attacks are difficult to detect as their attack signature is similar to benign network traffic. The existing AI-based detection algorithms in the literature are signature-based, and their efficacy in detecting unknown LR DoS attacks was not explored. …”
  8. 948

    Fuzzy controllers design using space-filling curves by Elshafei-Ahmed, M.

    Published 1998
    “…We then propose a SFC fuzzy inference model based on clustering the object space. The SFC fuzzy model is then used to design a fuzzy controller. …”
    Get full text
    Get full text
    article
  9. 949

    Fuzzy Controllers Design Using Space-Filling Curves by Elshafei-Ahmed, M

    Published 2020
    “…We then propose a SFC fuzzy inference model based on clustering the object space. The SFC fuzzy model is then used to design a fuzzy controller. …”
    Get full text
    article
  10. 950

    A comprehensive review of deep reinforcement learning applications from centralized power generation to modern energy internet frameworks by Sakib Mahmud (15302404)

    Published 2025
    “…We present a structured taxonomy covering value-based, policy-based, actor-critic, model-based, and advanced multi-agent and multi-objective approaches, and link algorithms to tasks such as dispatch, microgrid coordination, real-time pricing, load balancing, and demand–response. …”
  11. 951
  12. 952

    Single-channel speech denoising by masking the colored spectrograms by Sania Gul (18272227)

    Published 2025
    “…With a slightly reduced PESQ score (by 0.58 points), the proposed model offers an improvement of 2 % in STOI, and 4375 and 1135 times reduction respectively in the required number of training epochs and network parameters when compared to a GAN-based model augmented by WavLM; a large-scale self-supervised learning model. …”
  13. 953

    Systematic review and meta-analysis of performance of wearable artificial intelligence in detecting and predicting depression by Alaa Abd-Alrazaq (17430900)

    Published 2023
    “…Further studies are needed to examine the performance of wearable AI based on a combination of wearable device data and neuroimaging data and to distinguish patients with depression from those with other diseases.…”
  14. 954

    An efficient cache replacement strategy for the hybrid cache consistency approach by Haraty, Ramzi A.

    Published 2010
    “…Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. In this thesis, we proposed a new cache replacement strategy, the Least Unified Value strategy (LUV) to replace the Least Recently Used (LRU) that SACCS was based on. …”
    Get full text
    Get full text
    Get full text
    article
  15. 955
  16. 956

    Identification of phantom movements with an ensemble learning approach by Akhan Akbulut (17380285)

    Published 2022
    “…Our study demonstrated that the ensemble learning-based models resulted in higher accuracy in the detection of phantom movements. …”
  17. 957

    CubeSat Communication Subsystems: A Review of On-Board Transceiver Architectures, Protocols, and Performance by Amr Zeedan (17983750)

    Published 2023
    “…Nevertheless, several directions for improvements are proposed such as the use of improved channel coding algorithms, Field Programmable Gate Arrays (FPGAs), beamforming, advanced antennas, deployable solar panels, and transition to higher frequency bands. …”
  18. 958
  19. 959

    Systematic reviews in sentiment analysis: a tertiary study by Alexander Ligthart (14150871)

    Published 2022
    “…Different features, algorithms, and datasets used in sentiment analysis models are mapped. …”
  20. 960

    Humanizing AI in medical training: ethical framework for responsible design by Mohammed Tahri Sqalli (18420840)

    Published 2023
    “…The transparency pillar highlights the crucial role of maintaining the explainabilty of AI algorithms, while the fairness and justice pillar emphasizes on addressing biases in healthcare data and designing models that prioritize equitable medical training outcomes. …”