Search alternatives:
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
Showing 141 - 160 results of 921 for search '(((( data using algorithm ) OR ( test using algorithm ))) OR ( elements method algorithm ))', query time: 0.13s Refine Results
  1. 141

    Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study by Alkhodari, Mohanad Ahmed

    Published 2021
    “…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …”
    Get full text
    article
  2. 142
  3. 143

    Optimization of Interval Type-2 Fuzzy Logic System Using Grasshopper Optimization Algorithm by Saima Hassan (14918003)

    Published 2022
    “…The antecedent part parameters (Gaussian membership function parameters) are encoded as a population of artificial swarm of grasshoppers and optimized using its algorithm. Tuning of the consequent part parameters are accomplished using extreme learning machine. …”
  4. 144
  5. 145

    Practical single node failure recovery using fractional repetition codes in data centers by Itani, May

    Published 2016
    “…Hence, a practical solution for node failures is presented by using a self-designed genetic algorithm that searches within the feasible solution space. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  6. 146
  7. 147

    Optimization metaheuristic for software testing by Mansour, Nashat

    Published 2013
    “…We formulate the web application testing problem as an optimization problem and use a simulated annealing (SA) metaheuristic algorithm to generate test cases as sequences of events while keeping the test suite size reasonable. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 148

    Fast Transient Stability Assessment of Power Systems Using Optimized Temporal Convolutional Networks by Mohamed Massaoudi (16888710)

    Published 2024
    “…The proposed algorithm is evaluated on the 68-bus system and the Northeastern United States 25k-bus synthetic test system with credible contingencies using the PowerWorld simulator. …”
  9. 149
  10. 150
  11. 151
  12. 152

    Deep Learning-Based Short-Term Load Forecasting Approach in Smart Grid With Clustering and Consumption Pattern Recognition by Dabeeruddin Syed (16864260)

    Published 2021
    “…The accuracy of the proposed modeling is tested on a 1,000-transformer substation subset of the Spanish distribution electrical network data containing more than 24 million load records. …”
  13. 153

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group by Iqtadar Hussain (14147850)

    Published 2023
    “…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …”
  14. 154
  15. 155
  16. 156
  17. 157

    Design of adaptive arrays based on element position perturbations by Dawoud, M.M.

    Published 1993
    “…The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …”
    Get full text
    Get full text
    article
  18. 158

    An Optimized Feature Selection Technique in Diversified Natural Scene Text for Classification Using Genetic Algorithm by Ghulam Jillani Ansari (16896342)

    Published 2021
    “…The Support Vector Machine (SVM) algorithm is used for classification and the average F-Score is used as fitness function and target condition. …”
  19. 159
  20. 160

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models by Osama Bassam J. Rabie (21323741)

    Published 2024
    “…Moreover, the DBRF classification model is deployed to categorize the normal and attacking data flows using optimized features. Here, the proposed DRF-DBRF security model's performance is validated and tested using five different and popular IoT benchmarking datasets. …”