Showing 1 - 20 results of 3,758 for search '(((( element control algorithm ) OR ( element method algorithm ))) OR ( level using algorithm ))', query time: 0.22s Refine Results
  1. 1

    Convergence curve of the DBO algorithm. by Ma Haohao (22177538)

    Published 2025
    “…The improved Dung Beetle Optimization algorithm, Back Propagation Neural Network, Finite Element Analysis, and Response Surface Methodology provide a strong guarantee for the selection of robot polishing process parameters. …”
  2. 2

    Power quality control algorithms for small scale power intergration systems by Advocate Mlamla (20170815)

    Published 2024
    “…Optimisation of effective compensation for the CPDs depends on the proper selection of control algorithms for the gate switching of the Voltage Source Converters (VSCs) used. …”
  3. 3
  4. 4
  5. 5
  6. 6

    Four factors and three levels of the experiment. by Ma Haohao (22177538)

    Published 2025
    “…The improved Dung Beetle Optimization algorithm, Back Propagation Neural Network, Finite Element Analysis, and Response Surface Methodology provide a strong guarantee for the selection of robot polishing process parameters. …”
  7. 7

    Four factors and three levels of the experiment. by Ma Haohao (22177538)

    Published 2025
    “…The improved Dung Beetle Optimization algorithm, Back Propagation Neural Network, Finite Element Analysis, and Response Surface Methodology provide a strong guarantee for the selection of robot polishing process parameters. …”
  8. 8
  9. 9

    Flowchart of adaptive variable impedance control. by Ma Haohao (22177538)

    Published 2025
    “…The improved Dung Beetle Optimization algorithm, Back Propagation Neural Network, Finite Element Analysis, and Response Surface Methodology provide a strong guarantee for the selection of robot polishing process parameters. …”
  10. 10
  11. 11
  12. 12

    Sanitized databases using MLHProtector algorithm. by Loan T. T. Nguyen (20660789)

    Published 2025
    “…To address this issue, this work suggests two PPUM algorithms, namely <b>MLHProtector</b> and <b>FMLHProtector</b>, to operate at all abstraction levels in a transaction database to protect them from data mining algorithms. …”
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20