Search alternatives:
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
based models » based modeling (Expand Search)
Showing 841 - 860 results of 1,002 for search '(((( data using algorithm ) OR ( based models algorithm ))) OR ( elements method algorithm ))', query time: 0.13s Refine Results
  1. 841
  2. 842

    A Terrain classification system for coseismic landslide hazard analysis: Lebanon, a case study by Grant, Alex R.

    Published 2014
    “…In this work topographic slope, calculated using Ritter’s algorithm (1987) is used to demarcate landslide failure modes. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  3. 843

    Real-Time Smart-Digital Stethoscope System for Heart Diseases Monitoring by Muhammad E.H. Chowdhury (17151154)

    Published 2019
    “…The cost-adjusted optimized ensemble algorithm can produce 97% and 88% accuracy of classifying abnormal and normal HS, respectively.…”
  4. 844

    " Design of Variable Structure Stabilizer for a Nonlinesr Mode of SMIB System: Particle Swarm Approach" by Al-Hamouz, Z.

    Published 2006
    “…In this paper, a particle swarm-(PSO) based variable structure stabilizer (VSC) is proposed for enhancing the dynamic stability of a nonlinear model of synchronous machine infinite busbar system (SMIB). …”
    Get full text
    article
  5. 845

    "Design of Variable Structure Stabilizer for a Nonlinesr Mode of SMIB System: Particle Swarm Approach" by Al-Duwaish, H.

    Published 2006
    “…In this paper, a particle swarm-(PSO) based variable structure stabilizer (VSC) is proposed for enhancing the dynamic stability of a nonlinear model of synchronous machine infinite busbar system (SMIB). …”
    Get full text
    article
  6. 846

    Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers by Ali Sharida (17947847)

    Published 2023
    “…To develop the DT, a dense deep neural network (DNN) machine learning approach is used. The DT is trained offline using a set of experimental data and updated online to get the maximum possible accuracy. …”
  7. 847

    Robustness evaluation of real-Time Protocols by Tarhini, Abbas

    Published 2006
    “…In this paper, we suggest a methodology for measuring the degree of robustness for Real-Time Component-Based Systems (RTCBS). Each component of the RTCBS system is modeled as a Timed Labeled Transition System (TLTS). …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 848

    A Survey of Deep Learning Approaches for the Monitoring and Classification of Seagrass by Uzma Nawaz (21980708)

    Published 2025
    “…By synthesizing findings across various data sources and model architectures, we offer critical insights into the selection of context-aware algorithms and identify key research gaps, an essential step for advancing the reliability and applicability of AI-driven seagrass conservation efforts.…”
  9. 849
  10. 850

    Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks by Muhammed Al-Ali (16810677)

    Published 2023
    “…An optimal resource allocation scheme is proposed with two scenarios including a guaranteed fairness level and minimum data rate among eMBB users. In addition, a knapsack-inspired punctured resource allocation algorithm is proposed where the users’ channel qualities of both services are considered at each time slot leading to the most suitable Resource Block (RB) selection for puncturing in a way that minimizes the negative impact on eMBB performance. …”
  11. 851

    Computational evluation of protein energy functions by Mansour, Nashat

    Published 2014
    “…Also, we propose an approach based on a simulated annealing algorithm to find a better combination of energy terms, by assigning different weights to the terms, for the purpose of improving the capability of the computational prediction methods.…”
    Get full text
    Get full text
    Get full text
    conferenceObject
  12. 852

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD by Saeed Ullah Jan (9079260)

    Published 2021
    “…An attacker can easily capture data from the available network channel and use it for their own purpose. …”
  13. 853

    Predicting Android Malware Using Evolution Networks by Chahine, Joy

    Published 2025
    “…With this aim, we introduce evolutionary networks, and particularly the Susceptible-Infectious-Susceptible (SIS) model, as a way to address the limitations of previous studies which are typically based on traditional machine learning models. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  14. 854

    Enhancement of power system dynamic performance through an on-line self-tuning adaptive SVC controller by Rahim, A.H.M.A.

    Published 2006
    “…The control derived is based on a pole-shifting technique employing a predicted plant model. …”
    Get full text
    article
  15. 855

    Using Text Mining and Clustering Techniques on Tweets to Discover Trending Topics in Dubai by Hamadeh, Moutaz Wajih

    Published 2015
    “…Tweets corpus of Dubai were collected, they were presented through the bag of words model using TF-IDF weighting scheme, after that the output of text transformation was introduced to k-means clustering algorithm with cosine similarity measure. …”
    Get full text
  16. 856
  17. 857
  18. 858

    A novel technique for fast multiplication by Sait, Sadiq M.

    Published 1995
    “…In case of 2's complement multiplication the tree of carry-save-adders also receives a correction output produced in parallel with the partial products. The algorithms is modeled in a hardware description language and its VLSI chip implemented. …”
    Get full text
    Get full text
    article
  19. 859

    Anonymizing multimedia documents by Haraty, Ramzi

    Published 2016
    “…In this paper, we propose de-linkability, a privacy-preserving constraint to bound the amount of information outsourced that can be used to re-identify individuals. We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  20. 860