Search alternatives:
research algorithm » search algorithm (Expand Search)
developing based » developing a (Expand Search), developing 21st (Expand Search)
using algorithm » cosine algorithm (Expand Search)
Showing 881 - 900 results of 903 for search '(((( developing based algorithm ) OR ( elements research algorithm ))) OR ( data using algorithm ))', query time: 0.11s Refine Results
  1. 881
  2. 882

    Four quadrant robust quick response optimally efficient inverterfed induction motor drive by Islam, S.M.

    Published 1989
    “…Simulation results with a 100-hp motor show that up to 80% savings in controllable losses are achievable at light load, and the motor can reach rated speed in just 750 ms. The control algorithms developed are readily implementable with present-day microprocessors…”
    Get full text
    Get full text
    article
  3. 883
  4. 884

    Reconstruction and simulation of neocortical microcircuitry by Khazen, Georges

    Published 2015
    “…We present a first-draft digital reconstruction of the microcircuitry of somatosensory cortex of juvenile rat. The reconstruction uses cellular and synaptic organizing principles to algorithmically reconstruct detailed anatomy and physiology from sparse experimental data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 885

    Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review by Yazeed Yasin Ghadi (16667109)

    Published 2024
    “…Furthermore, this study also focuses on different Machine learning algorithms that are used to secure wireless sensor networks. …”
  6. 886

    Industrial Internet of Things enabled technologies, challenges, and future directions by Shams Forruque, Ahmed

    Published 2023
    “…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …”
    Get full text
    Get full text
    Get full text
    article
  7. 887

    Predicting Android Malware Using Evolution Networks by Chahine, Joy

    Published 2025
    “…This issue requires the development of efficient solutions in order to keep up with the continuous evolution of malware. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  8. 888
  9. 889

    Advancing Coherent Power Grid Partitioning: A Review Embracing Machine and Deep Learning by Mohamed Massaoudi (16888710)

    Published 2025
    “…This article provides an updated review of the cutting-edge machine learning and data-driven techniques used for PGP in networked PSs. …”
  10. 890

    Industrial Internet of Things enabled technologies, challenges, and future directions by Shams Forruque Ahmed (16517712)

    Published 2023
    “…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …”
  11. 891
  12. 892

    Crashworthiness optimization of composite hexagonal ring system using random forest classification and artificial neural network by Monzure-Khoda Kazi (17191207)

    Published 2024
    “…These algorithms include random forest (RF) classification and artificial neural networks (ANN). …”
  13. 893

    Cardiovascular health research priorities in the United Arab Emirates by Ghader, Nariman

    Published 2023
    “…The top research priority areas were: development of evidence-based, customized algorithms for CVD prevention and in-hospital emergency interventions; the availability, accessibility, and affordability of CVD treatment and rehabilitation; identification of relationships between CVDs, lifestyle factors, and mental health; efficacy and constraints in the management of cardiac emergencies; and epidemiological studies that trace CVD in the UAE. …”
    Get full text
    article
  14. 894

    Precision nutrition: A systematic literature review by Daniel Kirk (17302798)

    Published 2021
    “…Therefore, we carried out a Systematic Literature Review (SLR) to provide an overview of where and how machine learning has been used in Precision Nutrition from various aspects, what such machine learning models use as input features, what the availability status of the data used in the literature is, and how the models are evaluated. …”
  15. 895

    An Enhanced Approach for Solar PV Hosting Capacity Analysis in Distribution Networks by Mohammad Zain Ul Abideen (16904637)

    Published 2022
    “…The developed algorithms were tested on the IEEE 123 bus network, and their results were compared. …”
  16. 896

    Machine learning for predicting outcomes of transcatheter aortic valve implantation: A systematic review by Ruba, Sulaiman

    Published 2025
    “…MethodsPreferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guideline was adapted for searching the PubMed and Scopus databases on ML use in TAVI outcomes prediction. Once the studies that meet the inclusion criteria were identified, data from these studies were retrieved and were further examined. 17 parameters relevant to TAVI outcomes were carefully identified for assessing the quality of the included studies. …”
    Get full text
    Get full text
    Get full text
    article
  17. 897

    Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review by Yasir Ali (799969)

    Published 2023
    “…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …”
  18. 898
  19. 899
  20. 900

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices by Neder Karmous (19743430)

    Published 2024
    “…We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. …”