Search alternatives:
using algorithm » cosine algorithm (Expand Search)
systems using » system using (Expand Search)
update » updated (Expand Search)
Showing 201 - 220 results of 1,152 for search '(((( data using algorithm ) OR ( systems using algorithm ))) OR ( elements update algorithm ))', query time: 0.14s Refine Results
  1. 201
  2. 202

    Energy Hub Optimal Scheduling and Management in the Day-Ahead Market Considering Renewable Energy Sources, CHP, Electric Vehicles, and Storage Systems Using Improved Fick’s Law Algorithm by Ali S. Alghamdi (12722891)

    Published 2023
    “…The optimum capacity of EH equipment, including photovoltaic and wind renewable energy sources, a combined heat and power system (CHP), a boiler, energy storage, and electric vehicles is determined in the day-ahead market using the improved Fick’s law algorithm (IFLA), considering the energy profit maximization and also satisfying the linear network and hub constraints. …”
  3. 203

    Land Use/Land Cover Changes Impact on Groundwater Level and Quality in the Northern Part of the United Arab Emirates by Elmahdy, Samy

    Published 2020
    “…Each pair of enhanced LULC maps (1990–2000, 2000–2010, 2010–2018, and 1990–2018) were used as input data for an image difference algorithm to monitor LULC changes. …”
    Get full text
    article
  4. 204

    Artificial Intelligence for the Prediction and Early Diagnosis of Pancreatic Cancer: Scoping Review by Zainab Jan (17306614)

    Published 2023
    “…Radiological images (14/30, 47%) were the most frequently used data in the included articles. Most of the included articles used data sets with a size of <1000 samples (11/30, 37%). …”
  5. 205
  6. 206
  7. 207

    A Novel Fault Diagnosis of Uncertain Systems Based on Interval Gaussian Process Regression: Application to Wind Energy Conversion Systems by Majdi Mansouri (16869885)

    Published 2020
    “…Thus, this paper proposes a novel Interval Gaussian Process Regression (IGPR)-based Random Forest (RF) technique (IGPR-RF) for diagnosing uncertain WEC systems. In the proposed IGPR-RF technique, the effective interval-valued nonlinear statistical features are extracted and selected using the IGPR model and then fed to the RF algorithm for fault classification purposes. …”
  8. 208
  9. 209
  10. 210

    The application of control algorithm for optimal performance of evaporatively-cooled façade system in hot dry and humid weathers by Albert Al Touma (17302768)

    Published 2021
    “…The optimization of the system parameters is expected to overcome the limitations of using evaporative coolers in humid countries. …”
  11. 211

    Heat rate curve approximation for power plants without data measuring devices by Poullikkas, Andreas

    Published 2012
    “…The method is applied on a given power system, in which we calculate the electricity cost using the CAPSE (computer aided power economics) algorithm. …”
    Get full text
    article
  12. 212

    A Novel Genetic Trajectory Planning Algorithm With Variable Population Size for Multi-UAV-Assisted Mobile Edge Computing System by Muhammad Asim (2235472)

    Published 2021
    “…In the first phase, a genetic algorithm (GA) with a variable population size is used to update the deployment of SPs. …”
  13. 213
  14. 214

    Practical Multiple Node Failure Recovery in Distributed Storage Systems by Itani, M.

    Published 2016
    “…The problem is solved using genetic algorithms that search within the feasible solution space. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 215
  16. 216

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group by Iqtadar Hussain (14147850)

    Published 2023
    “…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …”
  17. 217
  18. 218
  19. 219
  20. 220

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…So far none addresses the use of Threat Intelligence (IT) data in Ensemble Learning algorithms to improve the detection process, nor does it work as a function of time, that is, taking into account what happens on the network in a limited time interval. …”
    Get full text