Search alternatives:
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
based models » based modeling (Expand Search)
models algorithm » mould algorithm (Expand Search), deer algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
based models » based modeling (Expand Search)
-
841
A new approach and faster exact methods for the maximum common subgraph problem
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
842
A Terrain classification system for coseismic landslide hazard analysis: Lebanon, a case study
Published 2014“…In this work topographic slope, calculated using Ritter’s algorithm (1987) is used to demarcate landslide failure modes. …”
Get full text
Get full text
Get full text
conferenceObject -
843
Real-Time Smart-Digital Stethoscope System for Heart Diseases Monitoring
Published 2019“…The cost-adjusted optimized ensemble algorithm can produce 97% and 88% accuracy of classifying abnormal and normal HS, respectively.…”
-
844
" Design of Variable Structure Stabilizer for a Nonlinesr Mode of SMIB System: Particle Swarm Approach"
Published 2006“…In this paper, a particle swarm-(PSO) based variable structure stabilizer (VSC) is proposed for enhancing the dynamic stability of a nonlinear model of synchronous machine infinite busbar system (SMIB). …”
Get full text
article -
845
"Design of Variable Structure Stabilizer for a Nonlinesr Mode of SMIB System: Particle Swarm Approach"
Published 2006“…In this paper, a particle swarm-(PSO) based variable structure stabilizer (VSC) is proposed for enhancing the dynamic stability of a nonlinear model of synchronous machine infinite busbar system (SMIB). …”
Get full text
article -
846
Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers
Published 2023“…To develop the DT, a dense deep neural network (DNN) machine learning approach is used. The DT is trained offline using a set of experimental data and updated online to get the maximum possible accuracy. …”
-
847
Robustness evaluation of real-Time Protocols
Published 2006“…In this paper, we suggest a methodology for measuring the degree of robustness for Real-Time Component-Based Systems (RTCBS). Each component of the RTCBS system is modeled as a Timed Labeled Transition System (TLTS). …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
848
A Survey of Deep Learning Approaches for the Monitoring and Classification of Seagrass
Published 2025“…By synthesizing findings across various data sources and model architectures, we offer critical insights into the selection of context-aware algorithms and identify key research gaps, an essential step for advancing the reliability and applicability of AI-driven seagrass conservation efforts.…”
-
849
Adaptive PID Controller for a Non Linear Pendulum System Using Recurrent Neural Networks
Published 2005Get full text
doctoralThesis -
850
Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks
Published 2023“…An optimal resource allocation scheme is proposed with two scenarios including a guaranteed fairness level and minimum data rate among eMBB users. In addition, a knapsack-inspired punctured resource allocation algorithm is proposed where the users’ channel qualities of both services are considered at each time slot leading to the most suitable Resource Block (RB) selection for puncturing in a way that minimizes the negative impact on eMBB performance. …”
-
851
Computational evluation of protein energy functions
Published 2014“…Also, we propose an approach based on a simulated annealing algorithm to find a better combination of energy terms, by assigning different weights to the terms, for the purpose of improving the capability of the computational prediction methods.…”
Get full text
Get full text
Get full text
conferenceObject -
852
Design and Analysis of Lightweight Authentication Protocol for Securing IoD
Published 2021“…An attacker can easily capture data from the available network channel and use it for their own purpose. …”
-
853
Predicting Android Malware Using Evolution Networks
Published 2025“…With this aim, we introduce evolutionary networks, and particularly the Susceptible-Infectious-Susceptible (SIS) model, as a way to address the limitations of previous studies which are typically based on traditional machine learning models. …”
Get full text
Get full text
Get full text
masterThesis -
854
Enhancement of power system dynamic performance through an on-line self-tuning adaptive SVC controller
Published 2006“…The control derived is based on a pole-shifting technique employing a predicted plant model. …”
Get full text
article -
855
Using Text Mining and Clustering Techniques on Tweets to Discover Trending Topics in Dubai
Published 2015“…Tweets corpus of Dubai were collected, they were presented through the bag of words model using TF-IDF weighting scheme, after that the output of text transformation was introduced to k-means clustering algorithm with cosine similarity measure. …”
Get full text
-
856
Optimal Routing Protocol in Multimedia Wireless Sensor Networks
Published 2011Get full text
doctoralThesis -
857
Assessment and Performance Analysis of Machine Learning Techniques for Gas Sensing E-nose Systems
Published 2021Get full text
doctoralThesis -
858
A novel technique for fast multiplication
Published 1995“…In case of 2's complement multiplication the tree of carry-save-adders also receives a correction output produced in parallel with the partial products. The algorithms is modeled in a hardware description language and its VLSI chip implemented. …”
Get full text
Get full text
article -
859
Anonymizing multimedia documents
Published 2016“…In this paper, we propose de-linkability, a privacy-preserving constraint to bound the amount of information outsourced that can be used to re-identify individuals. We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …”
Get full text
Get full text
Get full text
Get full text
article -
860
A Navigation System for Indoor/Outdoor Environments with an Unmanned Ground Vehicle (UGV)
Published 2015Get full text
doctoralThesis