Search alternatives:
making algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
data making » data mining (Expand Search)
develop » developed (Expand Search)
making algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
data making » data mining (Expand Search)
develop » developed (Expand Search)
-
81
Design and development of an embedded controller for roboticmanipulator
Published 1998“…The embedded controller is microprocessor based, which provides the designer with the advantage of using a highly-integrated processor and the ability to develop the software needed…”
Get full text
Get full text
article -
82
Indexing Arabic texts using association rule data mining
Published 2019“…The model denotes extracting new relevant words by relating those chosen by previous classical methods to new words using data mining rules. …”
Get full text
Get full text
Get full text
Get full text
article -
83
A Scatter search algorithm for exam scheduling. (c2006)
Published 2006Get full text
Get full text
masterThesis -
84
-
85
Interval-Valued SVM Based ABO for Fault Detection and Diagnosis of Wind Energy Conversion Systems
Published 2022“…The proposals will enhance the monitoring and diagnosis of the WEC system while taking into account the system uncertainties. The developed techniques are based on Support Vector Machine (SVM) model to improve the diagnosis of WEC systems. …”
-
86
Using genetic algorithms to optimize software quality estimation models
Published 2004“…This thesis explores the use of genetic algorithms for the problem of optimizing existing rule-based software quality estimation models. …”
Get full text
Get full text
Get full text
masterThesis -
87
A Tabu Search Algorithm For Maintenance Scheduling Of Generating Units
Published 2020“…A new heuristic algorithm based on the Tabu search has been proposed for the maintenance schedule (MS) of electric generation units. …”
Get full text
article -
88
A Tabu Search Algorithm For Maintenance Scheduling Of Generating Units
Published 2020“…A new heuristic algorithm based on the Tabu search has been proposed for the maintenance schedule (MS) of electric generation units. …”
Get full text
article -
89
Power Control Algorithms for Media Transmission in Remote Healthcare Systems
Published 2018“…Thus, this paper first proposes a transmission power control (TPC)-based energy-efficient algorithm (EEA) for when a subject is in different postures, i.e., standing, walking, and running, in wireless body sensor networks. …”
-
90
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …”
Get full text
-
91
A hybrid heuristic approach to optimize rule based software quality estimation models. (c2008)
Published 2008Get full text
Get full text
masterThesis -
92
Evolutionary Game-Based Battery Scheduling: A Comparative Study for Prosumers in Smart Grids
Published 2025“…The primary objective is to develop an efficient, reliable, private, and scalable algorithm for battery scheduling that ensures economic efficiency and system stability, even under dynamic market conditions. …”
-
93
A Genetic Algorithm for Improving Accuracy of Software Quality Predictive Models
Published 2010“…In this work, we present a genetic algorithm to optimize predictive models used to estimate software quality characteristics. …”
Get full text
Get full text
Get full text
article -
94
Novel Peak Detection Algorithms for Pileup Minimization in Gamma Ray Spectroscopy
Published 2006“…A number of parameter estimation and digital online peak localisation algorithms are being developed, including a pulse classification technique which uses a simple peak search routine based on the smoothed first derivative method, which gave a percentage error of peak amplitude of less than 1%. …”
Get full text
Get full text
article -
95
A Modular Reconfigurable Architecture for Asymmetric and Symmetric-key Cryptographic Algorithms
Published 2007“…Numerous such algorithms have been devised, and many have found popularity in different domains. …”
Get full text
masterThesis -
96
An image processing and genetic algorithm-based approach for the detection of melanoma in patients
Published 2018“…The second phase classifies lesions using a Genetic Algorithm. Our technique shows a significant improvement over other well-known algorithms and proves to be more stable on both training and testing data.…”
Get full text
Get full text
Get full text
Get full text
article -
97
Experimental Investigation and Comparative Evaluation of Standard Level Shifted Multi-Carrier Modulation Schemes With a Constraint GA Based SHE Techniques for a Seven-Level PUC Inv...
Published 2019“…Different standard multicarrier sinusoidal pulse-width modulation techniques (SPWMs) are adapted for the generation of switching gate signals for the PUC power switches, and these SPWMs are compared with novel optimization-based selective harmonic elimination (SHE) that employs genetic algorithm (GA) for solving nonlinear SHE equation with a constraint that eliminated all third-order harmonics efficiently. …”
-
98
A new family of multi-step quasi-Newton algorithms for unconstrained optimization
Published 1999“…It concentrates on deriving a variable-metric family of minimum curvature algorithms for unconstrained optimization. The derivation is based on considering a rational model, with a certain tuning parameter, where the aim is to develop a general framework that encompasses all possible two-step minimum curvature algorithms generated by appropriate parameter choices. …”
Get full text
Get full text
article -
99
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…We present the new framework for the detection of cyberattacks, which makes use of AI and ML. We begin a process to cleaning up the data in the CPS database by applying normalization to eliminate errors and duplication. …”
Get full text
Get full text
-
100
UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks
Published 2018“…Among the emerging markets, Internet of Things (IoT) use cases are standing out with the proliferation of a wide range of sensors that can be configured to continuously monitor and transmit data for intelligent processing and decision making. …”
Get full text
Get full text
Get full text
Get full text
article