Showing 681 - 700 results of 895 for search '(((( developing based algorithm ) OR ( elements data algorithm ))) OR ( data using algorithm ))*', query time: 0.12s Refine Results
  1. 681
  2. 682

    Exploring Digital Competitiveness through Bayesian Belief Networks by Qazi, Abroon

    Published 2025
    “…The methodology involves constructing BBN models using data from the IMD Digital Competitiveness Ranking 2023 for 64 countries. …”
    Get full text
    article
  3. 683

    Modeling and Bias-Robust Estimation of the Acoustic Release of Chemotherapeutics from Liposomes by Wadi, Ali

    Published 2019
    “…Optimality is guaranteed by accurately identifying the underlying statistical noise characteristics in experimental data. The estimator also quantifies the bias in the release, exhibited by the experimental data. …”
    Get full text
    article
  4. 684

    Process Mining over Unordered Event Streams by Awad, Ahmed

    Published 2020
    “…This requires online algorithms that, instead of keeping the whole history of event data, work incrementally and update analysis results upon the arrival of new events. …”
    Get full text
    Get full text
    Get full text
  5. 685

    Hardware design and VLSI implementation of a byte-wise CRCgenerator chip by Sait, Sadiq M.

    Published 1995
    “…The number of clock cycles required to generate and transmit any CRC (for an 8 byte message) is just two more than the time required to calculate it (in all 10 clock pulses). The CRC chip can be used in a number of applications. These include areas such as error detection and correction in data communications, signature analysis, and mass storage devices for parallel information transfers…”
    Get full text
    Get full text
    article
  6. 686

    Reconfigured Photovoltaic Model to Facilitate Maximum Power Point Tracking for Micro and Nano-Grid Systems by J. Prasanth Ram (19499062)

    Published 2022
    “…This enables the use of a simple Perturb and Observe (P&O) algorithm to easily track GMPP. For reconfiguration, a simple 5 × 5 PV array is considered, and a new physical relocation procedure based on the position square method is proposed. …”
  7. 687
  8. 688

    A multi-pretraining U-Net architecture for semantic segmentation by Cagla Copurkaya (22502042)

    Published 2025
    “…For the validation of the proposed model, we used data from 21,000 cell nuclei at a resolution of 1000 by 1000 pixels. …”
  9. 689

    A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer by M. Z. Yildiz (16855476)

    Published 2019
    “…The results of the analysis have shown that the proposed encryption algorithm can be used in identification and verification systems. …”
  10. 690

    Impacts of On-Grid Solar PV on Distribution Networks and Potential Solutions: A Case Study in the Region of Zahle by Korkmaz, Jessica

    Published 2025
    “…The siting and sizing methodology is conducted by considering five different optimization algorithms, namely the single-objective genetic algorithm (SOGA), the combined SOGA and loss sensitivity factor algorithm (SOGA-LSF), the multi-objective genetic algorithm (MOGA), the combined MOGA-LSF and the CAPADD algorithm of OpenDSS. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  11. 691

    Enhancing Building Energy Management: Adaptive Edge Computing for Optimized Efficiency and Inhabitant Comfort by Sergio Márquez-Sánchez (19437985)

    Published 2023
    “…However, these BEMSs often suffer from a critical limitation—they are primarily trained on building energy data alone, disregarding crucial elements such as occupant comfort and preferences. …”
  12. 692

    Local convexity preserving rational cubic spline curves by Sarfraz, M.

    Published 1997
    “…An algorithm is presented which constructs a curve by interpolating the given data points. …”
    Get full text
    Get full text
    article
  13. 693

    On sensor selection in mobile devices based on energy, application accuracy, and context metrics by Taleb, Sireen

    Published 2013
    “…We use this algorithm to build a sensor selection model to choose among location sensors. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  14. 694
  15. 695

    Hardware Model of an Expandable RSA Cryptographic System by Gutub, Adnan

    Published 1998
    “…Data security is an important aspect of information transmission and storage in an electronic form. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  16. 696

    Deepfakes Signatures Detection in the Handcrafted Features Space by Hamadene, Assia

    Published 2023
    “…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …”
    Get full text
  17. 697
  18. 698

    Particle swarm optimization for multimachine power systemstabilizer design by Abido, A.A.

    Published 2001
    “…In this paper, a novel evolutionary algorithm based approach to optimal design of multimachine power system stabilizers (PSSs) is proposed. …”
    Get full text
    Get full text
    article
  19. 699

    A fuzzy basis function network for generator excitation control by Abido, M.A.

    Published 1997
    “…The proposed FBFN is trained over a wide range of operating conditions in order to re-tune the PSS parameters in real-time based on generator loading conditions. The orthogonal least squares learning algorithm is developed for designing an adequate and parsimonious FBFN model. …”
    Get full text
    Get full text
    article
  20. 700

    Failure-Rate Prediction for De Havilland Dash-8 Tires Employing Neural-Network Technique by Al-Garni, Ahmed Z.

    Published 2006
    “…Six years of data are used for model building and validation. …”
    Get full text
    article