بدائل البحث:
means algorithm » search algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
source code » source model (توسيع البحث)
means algorithm » search algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
source code » source model (توسيع البحث)
-
21
A Modified PWM Strategy With an Improved ANN Based MPPT Algorithm for Solar PV Fed NPC Inverter Driven Induction Motor Drives
منشور في 2023"…Apart from that, a robust artificial neutral network (ANN) based incremental conductance maximum power point tracking (MPPT) algorithm is also introduced to control the dc-link voltage of the PV fed NPC inverter driven IMD system. …"
-
22
Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study
منشور في 2021"…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …"
احصل على النص الكامل
article -
23
Assessment of four dose calculation algorithms using IAEA-TECDOC-1583 with medium dependency correction factor (K<sub>med</sub>) application
منشور في 2024"…</p><h3>Methods</h3><p dir="ltr">BEAMnrc codes simulate radiation sources and model radiation transport for 6 MV and 15 MV photon beams. …"
-
24
A novel on design and implementation of hybrid MPPT controllers for solar PV systems under various partial shading conditions
منشور في 2024"…The studied hybrid optimization MPPT methods are equated in terms of oscillations across MPP, output power extraction, settling time of the MPP, dependency on the PV modeling, operating duty value of the converter, error finding accuracy of MPPT, algorithm complexity, tracking speed, periodic tuning required, and the number of sensing parameters utilized. …"
-
25
-
26
Optimizing transparent photovoltaic integration with battery energy storage systems in greenhouse: a daily light integral-constrained economic analysis considering BESS degradation
منشور في 2025"…<p>Greenhouses provide controlled environments for crop cultivation, and integrating semi transparent photovoltaic (STPV) panels offers the dual benefits of generating renewable energy while facilitating natural light penetration for photosynthesis. …"
-
27
Fault detection and classification in hybrid energy-based multi-area grid-connected microgrid clusters using discrete wavelet transform with deep neural networks
منشور في 2024"…<p dir="ltr">Microgrid control and operation depend on fault detection and classification because it allows quick fault separation and recovery. …"
-
28
-
29
Performance Analysis of a Three-to-Five Phase Dual Matrix Converter Based on Space Vector Pulse Width Modulation
منشور في 2019"…The hardware setup is developed and control algorithm is implemented using dSPACE working in conjunction with the FPGA interface board for practical validation.…"
-
30
Measuring ripple effect for object-oriented programs. (c2004)
منشور في 2004احصل على النص الكامل
احصل على النص الكامل
masterThesis -
31
Regression testing C# programs. (c2007)
منشور في 2007احصل على النص الكامل
احصل على النص الكامل
masterThesis -
32
Structural similarity evaluation between XML documents and DTDs
منشور في 2007"…We consider the various DTD operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes. Our approach is based on the concept of tree edit distance, as an effective and efficient means for comparing tree structures, XML documents and DTDs being modeled as ordered labeled trees. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
33
Practical Considerations in Frequency Diverse Array Radar Signal Processing
منشور في 2021احصل على النص الكامل
doctoralThesis -
34
UML-based regression testing for OO software
منشور في 2010"…When working with large and complex object-oriented systems, source code-based regression testing is usually costly. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
35
An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System
منشور في 2019"…Despite having different performance results on predicting failures, most of the models produced close outcomes. Meaning no “perfect” machine learning algorithm that will produce good results at particular problem, in fact for each type of problem a specific algorithm is suited and might achieves good outcome, while another algorithm fails heavily. …"
احصل على النص الكامل
-
36
Making progress with the automation of systematic reviews: principles of the International Collaboration for the Automation of Systematic Reviews (ICASR)
منشور في 2018"…</p><p dir="ltr">This paper sets out the principles devised at that meeting, which cover the need for improvement in efficiency of SR tasks, automation across the spectrum of SR tasks, continuous improvement, adherence to high quality standards, flexibility of use and combining components, the need for a collaboration and varied skills, the desire for open source, shared code and evaluation, and a requirement for replicability through rigorous and open evaluation.…"
-
37
Multidimensional Gains for Stochastic Approximation
منشور في 2019"…The proposed algorithms here aim for per-iteration minimization of the mean square estimate error. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
38
Digital Image Watermarking Using Balanced Multiwavelets
منشور في 2006"…In this paper, a robust watermarking algorithm using balanced multiwavelet transform is proposed. …"
احصل على النص الكامل
article -
39
Tracking and repairing damaged healthcare databases using the matrix
منشور في 2015"…The algorithm is based on data dependency and uses a single matrix. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
40
Common weaving approach in mainstream languages for software security hardening
منشور في 2013"…In the first approach, we prove them according to the rules and algorithms provided in this paper. In the second approach, we accommodate Kniesel's discipline that ensures that security solutions specified by our approach are applied at all and only the required points in source code, taking into consideration weaving interactions and interferences. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article