يعرض 421 - 440 نتائج من 902 نتيجة بحث عن '(((( developing based algorithm ) OR ( element search algorithm ))) OR ( data using algorithm ))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 421

    Analysis of power system stability enhancement via excitation and FACTS-based stabilizers حسب Abido, M. A.

    منشور في 2004
    "…An eigenvalue-based objective function to increase the system damping and improve the system response is developed. …"
    احصل على النص الكامل
    article
  2. 422
  3. 423

    Soft Sensor for NOx Emission using Dynamical Neural Network حسب Shakil, M.

    منشور في 2020
    "…Principal Component Analysis (PCA) is used to reduce number of input variables. Lag space for the model is found by using genetic algorithm to find the best time delayed model. …"
    احصل على النص الكامل
    article
  4. 424

    Scheduling and allocation in high-level synthesis using stochastic techniques حسب Sait, Sadiq M.

    منشور في 2020
    "…In this work, a unique approach to scheduling and allocation problem using the genetic algorithm (GA) is described. This approach is different from a previous attempt using GA (Wehn et al., IFIP Working Conference on Logic and Architecture Synthesis, Paris, 1990, pp. 47–56) in many respects. …"
    احصل على النص الكامل
    article
  5. 425

    Neural network-based failure rate prediction for De Havilland Dash-8 tires حسب Al-Garni, Ahmed Z.

    منشور في 2006
    "…Six years of data are used for model building and validation. …"
    احصل على النص الكامل
    article
  6. 426

    A heuristics for HTTP traffic identification in measuring user dissimilarity حسب Adeyemi R. Ikuesan (14157123)

    منشور في 2020
    "…The study utilizes HTTP request method of GET filtering, to develop a heuristic algorithm to identify user-initiated requests. …"
  7. 427
  8. 428

    RFID localization using single reader antenna. (c2014) حسب Msheik, Hamze

    منشور في 2016
    "…Our scheme is based on Power Map Matching algorithm. The proposed method employs the use of a Single Stationary Reader Antenna and multitags placed on the asset. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  9. 429

    TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection حسب Zina Chkirbene (16869987)

    منشور في 2020
    "…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …"
  10. 430

    A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis حسب Alaa Abd-Alrazaq (17430900)

    منشور في 2021
    "…Specifically, we used a clustering algorithm to group published articles based on the similarity of their abstracts to identify research hotspots and current research directions. …"
  11. 431
  12. 432

    Behavior-Based Machine Learning Approaches to Identify State-Sponsored Trolls on Twitter حسب Saleh Alhazbi (16869960)

    منشور في 2020
    "…We have proposed a set of behavioral features of users' activities on Twitter. Based on these features, we developed four classification models to identify political troll accounts, these models are based on decision tree, random forest, Adaboost, and gradient boost algorithms. …"
  13. 433

    Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation حسب Hariprasath Manoharan (14157966)

    منشور في 2023
    "…<p dir="ltr">The process of using robotic technology to examine underwater systems is still a difficult undertaking because the majority of automated activities lack network connectivity. …"
  14. 434

    Secrecy Performance of Decode-and-Forward Based Hybrid RF/VLC Relaying Systems حسب Jaber Al-Khori (16855470)

    منشور في 2019
    "…<p dir="ltr">In this paper, we consider the secrecy of a hybrid radio frequency (RF)/visible light communication (VLC) system equipped with decode-and-forward relaying. We develop physical layer security algorithms that mitigate eavesdropping on both RF and VLC networks based on zero-forcing beamforming techniques. …"
  15. 435
  16. 436

    Defining quantitative rules for identifying influential researchers: Insights from mathematics domain حسب Ghulam Mustafa (458105)

    منشور في 2024
    "…The rules were developed for each parameter category using the Decision Tree Algorithm, which achieved an average accuracy of 70 to 75 percent for identifying awardees in mathematics domains. …"
  17. 437

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…Nonetheless, the performance analysis section will be executed using the algorithmic big-O notation. The results show that these protocols are verifiably protected in the ROM and ROR model using the CDHP.…"
  18. 438
  19. 439
  20. 440

    Enhancement of SAR Speckle Denoising Using the Improved Iterative Filter حسب Yahia, Mohamed

    منشور في 2020
    "…Simulated, airborne (ESAR, Oberpfaffenhofen Germany) and spaceborne (Sentinel 1, Palm Jumeirah Dubai UAE) SAR data were used to assess the filtering performances of the studied filters.…"
    احصل على النص الكامل
    article