Search alternatives:
processing algorithm » processing algorithms (Expand Search)
rd algorithm » _ algorithms (Expand Search)
elements rd » elements _ (Expand Search)
develop » developed (Expand Search)
Showing 81 - 100 results of 231 for search '(((( develop control algorithm ) OR ( elements rd algorithm ))) OR ( image processing algorithm ))', query time: 0.13s Refine Results
  1. 81

    Applications of artificial intelligence in ultrasound imaging for carpal-tunnel syndrome diagnosis: a scoping review by Yosra Magdi Mekki (21673721)

    Published 2025
    “…Studies were included if they focused on the application of AI in US imaging for CTS diagnosis. Editorials, expert opinions, conference papers, dataset publications, and studies that did not have a clear clinical application of the AI algorithm were excluded.…”
  2. 82

    Metaheuristic Optimization‐Based Sliding Mode Control With Modified Perturb and Observe for Controlling MPPT of a PV Interfaced Grid Connected System by Anupama Ganguly (22502969)

    Published 2025
    “…The novelty of this article is the development of a sliding mode MPPT controller for photovoltaic (PV) systems working in sunny and shaded. …”
  3. 83
  4. 84

    Salak Image Classification Method Based Deep Learning Technique Using Two Transfer Learning Models by Theng, Lau Wei

    Published 2022
    “…Pre-processing on the dataset is required to standardize the dataset by resizing the image into 224 * 224 pixels, convert into jpg format and augmentation. …”
    Get full text
  5. 85
  6. 86

    Blockchain-Based Decentralized Architecture for Software Version Control by Muhammad Hammad (17541570)

    Published 2023
    “…The proof of authority (PoA) consensus algorithm will be used to approve the developer communicating modifications to the private blockchain network; the authority will only provide permission and will not be able to add, edit, or delete code files. …”
  7. 87

    Microwave brain imaging system to detect brain tumor using metamaterial loaded stacked antenna array by Amran Hossain (570706)

    Published 2022
    “…After that, the scattering parameters are collected, analyzed, and then processed by the Iteratively Corrected delay-multiply-and-sum algorithm to detect and reconstruct the brain tumor images. …”
  8. 88
  9. 89
  10. 90
  11. 91

    A stochastic PID controller for a class of MIMO systems by Saab, Samer S.

    Published 2017
    “…The development of the proposed algorithm is based on minimising a stochastic performance index. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  12. 92

    Power System Transient Stability Assessment Based on Machine Learning Algorithms and Grid Topology by Senyuk, Mihail

    Published 2023
    “…In this study, the emergency control algorithms based on ensemble machine learning algorithms (XGBoost and Random Forest) were developed for a low-inertia power system. …”
    Get full text
    article
  13. 93
  14. 94
  15. 95

    An Intelligent and Low-Cost Eye-Tracking System for Motorized Wheelchair Control by Mahmoud Dahmani (18810247)

    Published 2020
    “…This paper proposes a system to aid people with motor disabilities by restoring their ability to move effectively and effortlessly without having to rely on others utilizing an eye-controlled electric wheelchair. The system input is images of the user’s eye that are processed to estimate the gaze direction and the wheelchair was moved accordingly. …”
  16. 96

    IDENTIFICATION AND CONTROL STRATEGY APPLIED IN LOAD MANAGEMENT OF RESIDENTIAL AIR-CONDITIONERS by Hussain, Syed Ameenuddin

    Published 2004
    “…These steps involve identifying the parameters of systems and applying the control strategies as forced duty cycles. An integrated simulation environment was developed wherein the identification and control algorithm were implemented. …”
    Get full text
    masterThesis
  17. 97

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group by Iqtadar Hussain (14147850)

    Published 2023
    “…In addition, the proposed encryption algorithm utilizes two different chaotic maps. To ensure the appropriate utilization of these chaotic maps, we carry out in-depth analyses of their behavior in the context of secure communication and apply the pseudo-random sequences of chaotic maps in the proposed image encryption algorithm accordingly.…”
  18. 98

    A Concurrency control model for multilevel secure object-oriented databases by Haraty, Ramzi

    Published 1995
    “…Later we identify the existence of covert channels in the traditional conflict-serializable concurrency control schedulers and provide an alternative transaction-processing algorithm that ensures both correctness and security. …”
    Get full text
    Get full text
    Get full text
    article
  19. 99

    Real-Time Selective Harmonic Mitigation Technique for Power Converters Based on the Exchange Market Algorithm by Abraham Marquez Alcaide (18582451)

    Published 2020
    “…<p dir="ltr">Hand-in-hand with the smart-grid paradigm development, power converters used in high-power applications are facing important challenges related to efficiency and power quality. …”
  20. 100