Search alternatives:
functions algorithm » auction algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
elements rd » elements _ (Expand Search)
Showing 1 - 20 results of 107 for search '(((( elements rd algorithm ) OR ( complex functions algorithm ))) OR ( level detection algorithm ))', query time: 0.14s Refine Results
  1. 1
  2. 2
  3. 3

    Improved Reptile Search Algorithm by Salp Swarm Algorithm for Medical Image Segmentation by Abualigah, Laith

    Published 2023
    “…This study proposes a novel nature-inspired meta-heuristic optimizer based on the Reptile Search Algorithm combed with Salp Swarm Algorithm for image segmentation using gray-scale multi-level thresholding, called RSA-SSA. …”
    Get full text
  4. 4

    Optimum sensors allocation for drones multi-target tracking under complex environment using improved prairie dog optimization by Abu Zitar, Raed

    Published 2024
    “…The IPDOA performance was compared with the other 8 metaheuristic optimization algorithms and the testing showed its superiority over those techniques for solving this complex problem. …”
    Get full text
  5. 5

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems by Almajed, Rasha

    Published 2022
    “…According to the findings of several studies, the framework is significantly more effective than conventional methods in maintaining high levels of privacy. In addition, the framework outperforms conventional detection algorithms in words of detection rate, the rate of the false positive, and calculation time, respectively.…”
    Get full text
    Get full text
  6. 6

    Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers by Ali Sharida (17947847)

    Published 2023
    “…Then, the DT is used for the diagnosis and tolerance of open-switch faults (OSFs) and faults related to voltage and current sensors or for sensorless control. The OSF detection and localization algorithm is implemented based on the dynamic response difference between the physical system and its DT. …”
  7. 7

    Land Use/Land Cover Changes Impact on Groundwater Level and Quality in the Northern Part of the United Arab Emirates by Elmahdy, Samy

    Published 2020
    “…Each pair of enhanced LULC maps (1990–2000, 2000–2010, 2010–2018, and 1990–2018) were used as input data for an image difference algorithm to monitor LULC changes. Maps of change detection were then imported into a GIS environment and spatially correlated against the spatiotemporal maps of groundwater level and groundwater quality. …”
    Get full text
    article
  8. 8

    Computational evluation of protein energy functions by Mansour, Nashat

    Published 2014
    “…Proteins are organic compounds made up of chains of amino acids that fold into complex 3-dimensional structures based on their chemical and physical properties. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 9
  10. 10

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The effectiveness and dependability of the proposed hash function are evaluated by comparing it with two well-known hash algorithms, namely SHA-3 and SHA-2, as well as several other Chaos-based hash algorithms. …”
  11. 11

    Optimization of Support Structures for Offshore Wind Turbines using Genetic Algorithm with Domain-Trimming (GADT) by AlHamaydeh, Mohammad

    Published 2017
    “…The powerful genetic algorithm optimization technique is augmented with an innovative “domain-trimming” modification. …”
    Get full text
    article
  12. 12
  13. 13

    A new multimodulus blind equalization algorithm by Abrar, Shafayat

    Published 2004
    “…A new algorithm is presented for the blind equalization of complex signals. …”
    Get full text
    Get full text
    article
  14. 14

    Simultaneous stabilization of multimachine power systems viagenetic algorithms by Abdel-Magid, Y.L.

    Published 1999
    “…Two objective functions are presented, allowing the selection of the stabilizer parameters to shift some of the closed-loop eigenvalues to the left-hand side of a vertical line in the complex s-plane, or to a wedge-shape sector in the complex s-plane. …”
    Get full text
    Get full text
    article
  15. 15
  16. 16
  17. 17

    A neural networks algorithm for data path synthesis by Harmanani, Haidar M.

    Published 2003
    “…The method formulates the allocation problem using the clique partitioning problem, an NP-complete problem, and handles multicycle functional units as well as structural pipelining. The algorithm has a running time complexity of O(1) for a circuit with n operations and c shared resources. …”
    Get full text
    Get full text
    Get full text
    article
  18. 18

    Cyberbullying Detection in Arabic Text using Deep Learning by ALBAYARI, REEM RAMADAN SA’ID

    Published 2023
    “…Therefore, this study aims to evaluate several versions of Recurrent Neural Networks (RNNs) and Feedforward Neural Networks (FNNs) for detecting cyberbullying in the Arabic language. Although these algorithms are widely used in text classification and outperform the performance of classical classifiers, many have been extensively investigated in other domains such as sentiment analysis and dialect identification, as well as cyberbullying detection in English text. …”
    Get full text
  19. 19

    Genetic Algorithm Based Simultaneous Eigenvalue Placement Of Power Systems by Abdel Magid, Y.L.

    Published 2020
    “…The task of selecting the output feedback gains is converted to a simple optimization problem with an eigenvaluebased objective function, which is solved by a genetic algorithm. An objective function is presented allowing the selection of the output feedback gains to place the closed-loop eigenvalues in the left-hand side of a vertical line in the complex s-plane while shifting a specific mode of oscillation to a vertical strip and with bounds on the damping ratio. …”
    Get full text
    article
  20. 20

    A Multiswarm Intelligence Algorithm for Expensive Bound Constrained Optimization Problems by Wali Khan Mashwani (14590504)

    Published 2021
    “…Thirty bound constrained benchmark functions are used to evaluate the performance of the proposed algorithm. …”