Search alternatives:
component system » complaint system (Expand Search)
system algorithm » swarm algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
finding » findings (Expand Search)
Showing 21 - 40 results of 133 for search '(((( elements data algorithm ) OR ( component system algorithm ))) OR ( level finding algorithm ))', query time: 0.11s Refine Results
  1. 21

    Thermodynamic Analysis and Optimization of Densely-Packed Receiver Assembly Components in High-Concentration CPVT Solar Collectors by Sharaf, Omar Z.

    Published 2016
    “…However, accurate design models and clear simulation algorithms on the component-level are critical for the proper system-level engineering and evaluation of CPVT collectors. …”
    Get full text
    article
  2. 22

    Analyzing Partial Shading in PV Systems Using Wavelet Packet Transform and Empirical Mode Decomposition Techniques by Kais Abdulmawjood (17947784)

    Published 2025
    “…In the first stage, the WPT is used to split the PV voltage and string currents into specific sub-band frequencies, and then EMD is used to decompose the selected frequency bands into a number of intrinsic mode functions (IMFs) and a residual. The generated IMF components are then fed into the Random Forest (RF) algorithm designed for shading detection and classification. …”
  3. 23

    The Role of KM in Enhancing AI Algorithms and Systems by AlGhanem, Hani

    Published 2020
    “…The current study shows the relation between KM processes and AI systems from a higher perspective, giving different options to apply other KM processes for the same AI algorithm to reduce any implementation challenges and enhance the adoption level. …”
    Get full text
    Get full text
  4. 24
  5. 25

    Concurrent BIST Synthesis and Test Scheduling Using Genetic Algorithms by Harmanani, H. M.

    Published 2007
    “…The method is based on a genetic algorithm that efficiently explores the testable design space and finds a sub-optimal test registers assignment for each k-test session. …”
    Get full text
    Get full text
    Get full text
    article
  6. 26
  7. 27
  8. 28
  9. 29
  10. 30

    A Modular Reconfigurable Architecture for Asymmetric and Symmetric-key Cryptographic Algorithms by Zaidi, Ali Mustafa

    Published 2007
    “…It is widely recognized that security issues will play a crucial role in the majority of future computer and communication systems. Cryptographic algorithms are the central tools for achieving system security. …”
    Get full text
    masterThesis
  11. 31
  12. 32

    Genetic Algorithm for Solving Site Layout Problem with Unequal-Size and Constrained Facilities by Zouein, P. P.

    Published 2002
    “…The paper concludes with examples illustrating the strength and limitations of the proposed algorithm in the cases of ~1! loosely versus tightly constrained layouts with equal levels of interaction between facilities; ~2! …”
    Get full text
    Get full text
    Get full text
    article
  13. 33
  14. 34

    XBeGene: Scalable XML Documents Generator by Example Based on Real Data by Harazaki, Manami

    Published 2012
    “…Inspired by the query-by-example paradigm in information retrieval, Our generator system i)allows the user to provide her own sample XML documents as input, ii) analyzes the structure, occurrence frequencies, and content distributions for each XML element in the user input documents, and iii) produces synthetic XML documents which closely concur, in both structural and content features, to the user's input data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  15. 35

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems by Almajed, Rasha

    Published 2022
    “…A MATLAB simulation used to evaluate the new strategy, and the metrics obtained from that simulation are compared to those obtained from the older methods. According to the findings of several studies, the framework is significantly more effective than conventional methods in maintaining high levels of privacy. …”
    Get full text
    Get full text
  16. 36

    A Data-Driven Decision-Making Framework for Fleet Management in the Government Sector of Dubai by ALGHANEM, HANI SUBHI MOHD

    Published 2024
    “…The proposed framework comprises key elements: Important Decisions derived from interviews with transportation leaders, Knowledge Management enhanced by AI algorithms, Data Mining/Analysis utilizing historical data, the Fleet Management System employing Oracle ERP, and a Data-Driven Decision Support Framework that leans towards the extended framework approach. …”
    Get full text
  17. 37
  18. 38

    Real-Time Selective Harmonic Mitigation Technique for Power Converters Based on the Exchange Market Algorithm by Abraham Marquez Alcaide (18582451)

    Published 2020
    “…The performance of the EMA-based SHM is presented showing experimental results considering a reduced number of switching angles applied to a specific three-level converter, but the method can be extrapolated to any other three-level converter topology.…”
  19. 39

    Prediction of pressure gradient for oil-water flow: A comprehensive analysis on the performance of machine learning algorithms by Md Ferdous Wahid (13485799)

    Published 2022
    “…<p dir="ltr">Pressure gradient (PG) in liquid-liquid flow is one of the key components to design an energy-efficient transportation system for wellbores. …”
  20. 40

    Performance of artificial intelligence models in estimating blood glucose level among diabetic patients using non-invasive wearable device data by Arfan Ahmed (17541309)

    Published 2023
    “…One of the key aspects of WDs with machine learning (ML) algorithms is to find specific data signatures, called Digital biomarkers, that can be used in classification or gaging the extent of the underlying condition. …”