Showing 81 - 100 results of 511 for search '(((( develop based algorithm ) OR ( relevant data algorithm ))) OR ( data making algorithm ))', query time: 0.12s Refine Results
  1. 81

    Design and development of an embedded controller for roboticmanipulator by Bakhashwain, J.M.

    Published 1998
    “…The embedded controller is microprocessor based, which provides the designer with the advantage of using a highly-integrated processor and the ability to develop the software needed…”
    Get full text
    Get full text
    article
  2. 82

    Indexing Arabic texts using association rule data mining by Haraty, Ramzi A.

    Published 2019
    “…The model denotes extracting new relevant words by relating those chosen by previous classical methods to new words using data mining rules. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  3. 83
  4. 84
  5. 85

    Interval-Valued SVM Based ABO for Fault Detection and Diagnosis of Wind Energy Conversion Systems by Majdi Mansouri (16869885)

    Published 2022
    “…The proposals will enhance the monitoring and diagnosis of the WEC system while taking into account the system uncertainties. The developed techniques are based on Support Vector Machine (SVM) model to improve the diagnosis of WEC systems. …”
  6. 86

    Using genetic algorithms to optimize software quality estimation models by Azar, Danielle

    Published 2004
    “…This thesis explores the use of genetic algorithms for the problem of optimizing existing rule-based software quality estimation models. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  7. 87

    A Tabu Search Algorithm For Maintenance Scheduling Of Generating Units by El-Amin, I.

    Published 2020
    “…A new heuristic algorithm based on the Tabu search has been proposed for the maintenance schedule (MS) of electric generation units. …”
    Get full text
    article
  8. 88

    A Tabu Search Algorithm For Maintenance Scheduling Of Generating Units by Duffuaa, S. O.

    Published 2020
    “…A new heuristic algorithm based on the Tabu search has been proposed for the maintenance schedule (MS) of electric generation units. …”
    Get full text
    article
  9. 89

    Power Control Algorithms for Media Transmission in Remote Healthcare Systems by Ali Hassan Sodhro (18629392)

    Published 2018
    “…Thus, this paper first proposes a transmission power control (TPC)-based energy-efficient algorithm (EEA) for when a subject is in different postures, i.e., standing, walking, and running, in wireless body sensor networks. …”
  10. 90

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector by AL HAMMADI, SUMAYYA ABDULLA

    Published 2022
    “…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …”
    Get full text
  11. 91
  12. 92

    Evolutionary Game-Based Battery Scheduling: A Comparative Study for Prosumers in Smart Grids by Anas Karaki (17947808)

    Published 2025
    “…The primary objective is to develop an efficient, reliable, private, and scalable algorithm for battery scheduling that ensures economic efficiency and system stability, even under dynamic market conditions. …”
  13. 93

    A Genetic Algorithm for Improving Accuracy of Software Quality Predictive Models by Azar, Danielle

    Published 2010
    “…In this work, we present a genetic algorithm to optimize predictive models used to estimate software quality characteristics. …”
    Get full text
    Get full text
    Get full text
    article
  14. 94

    Novel Peak Detection Algorithms for Pileup Minimization in Gamma Ray Spectroscopy by Raad, M.W.

    Published 2006
    “…A number of parameter estimation and digital online peak localisation algorithms are being developed, including a pulse classification technique which uses a simple peak search routine based on the smoothed first derivative method, which gave a percentage error of peak amplitude of less than 1%. …”
    Get full text
    Get full text
    article
  15. 95

    A Modular Reconfigurable Architecture for Asymmetric and Symmetric-key Cryptographic Algorithms by Zaidi, Ali Mustafa

    Published 2007
    “…Numerous such algorithms have been devised, and many have found popularity in different domains. …”
    Get full text
    masterThesis
  16. 96

    An image processing and genetic algorithm-based approach for the detection of melanoma in patients by Tokajian, Sima

    Published 2018
    “…The second phase classifies lesions using a Genetic Algorithm. Our technique shows a significant improvement over other well-known algorithms and proves to be more stable on both training and testing data.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  17. 97

    Experimental Investigation and Comparative Evaluation of Standard Level Shifted Multi-Carrier Modulation Schemes With a Constraint GA Based SHE Techniques for a Seven-Level PUC Inv... by Atif Iqbal (5504636)

    Published 2019
    “…Different standard multicarrier sinusoidal pulse-width modulation techniques (SPWMs) are adapted for the generation of switching gate signals for the PUC power switches, and these SPWMs are compared with novel optimization-based selective harmonic elimination (SHE) that employs genetic algorithm (GA) for solving nonlinear SHE equation with a constraint that eliminated all third-order harmonics efficiently. …”
  18. 98

    A new family of multi-step quasi-Newton algorithms for unconstrained optimization by Obeid, Samir

    Published 1999
    “…It concentrates on deriving a variable-metric family of minimum curvature algorithms for unconstrained optimization. The derivation is based on considering a rational model, with a certain tuning parameter, where the aim is to develop a general framework that encompasses all possible two-step minimum curvature algorithms generated by appropriate parameter choices. …”
    Get full text
    Get full text
    article
  19. 99

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems by Almajed, Rasha

    Published 2022
    “…We present the new framework for the detection of cyberattacks, which makes use of AI and ML. We begin a process to cleaning up the data in the CPS database by applying normalization to eliminate errors and duplication. …”
    Get full text
    Get full text
  20. 100

    UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks by Ebrahimi, Dariush

    Published 2018
    “…Among the emerging markets, Internet of Things (IoT) use cases are standing out with the proliferation of a wide range of sensors that can be configured to continuously monitor and transmit data for intelligent processing and decision making. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article