Showing 121 - 140 results of 276 for search '(((( implement based algorithm ) OR ( element deer algorithm ))) OR ( level coding algorithm ))', query time: 0.13s Refine Results
  1. 121
  2. 122

    Efficiency Optimization of a DSP-Based Standalone PV System Using Fuzzy Logic and Dual-MPPT Control by Al Nabulsi, Ahmad

    Published 2012
    “…The first MPPT controller is an astronomical two-axis sun tracker, which is designed to track the sun over both the azimuth and elevation angles and obtain maximum solar radiation at all times. The second MPPT algorithm controls the power converter between the PV panel and the load and implements a new fuzzy-logic (FLC)-based perturb and observe (P&O) scheme to keep the system power operating point at its maximum. …”
    Get full text
    article
  3. 123

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …”
    Get full text
  4. 124

    Performance Analysis of a Three-to-Five Phase Dual Matrix Converter Based on Space Vector Pulse Width Modulation by Khaliqur Rahman (10214098)

    Published 2019
    “…<p dir="ltr">In this paper, space vector pulse width modulation (SVPWM)-based algorithms for a five-phase open-end load fed from dual matrix converter (DMC) have been proposed. …”
  5. 125
  6. 126

    Day-Ahead Load Demand Forecasting in Urban Community Cluster Microgrids Using Machine Learning Methods by Sivakavi Naga Venkata Bramareswara Rao (15944992)

    Published 2022
    “…From the results, it is found that the Levenberg–Marquardt optimization algorithm-based ANN model gives the best electrical load forecasting results.…”
  7. 127

    A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security by S. Shitharth (12017480)

    Published 2023
    “…Moreover, the Reconciliate Multi-Agent Markov Learning (RMML) based classification algorithm is used to predict the intrusion with its appropriate classes. …”
  8. 128

    Blue collar laborers’ travel pattern recognition: Machine learning classifier approach by Aya Hasan Alkhereibi (17151070)

    Published 2021
    “…A bagged Clustering algorithm was employed to identify the number of clusters, then the C-Means algorithm and the Pamk algorithm were implemented to validate the results. …”
  9. 129

    MAESTRO: Orchestrating Computational Offloading to Multiple FemtoClouds in Various Communication Environments by Hend Gedawy (23275984)

    Published 2022
    “…<p dir="ltr">Many novel IoT-based applications demand low latency, large compute resources, and high privacy. …”
  10. 130

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices by Neder Karmous (19743430)

    Published 2024
    “…Based on the performance metrics, such as confusion matrix, training time, prediction time, accuracy, and Area Under the Receiver Operating Characteristic curve (AUC-ROC), it was established that SDN-ML-IoT, when applied to RF, outperforms other ML algorithms, as well as similar approaches related to our work. …”
  11. 131

    Wearable wrist to finger photoplethysmogram translation through restoration using super operational neural networks based 1D-CycleGAN for enhancing cardiovascular monitoring by Sakib Mahmud (15302404)

    Published 2024
    “…Current signal processing techniques, and even state-of-the-art machine learning algorithms, frequently struggle to effectively restore the inherent bodily signals amidst the array of randomly generated distortions. …”
  12. 132
  13. 133

    Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches by Natasha Akram (20749538)

    Published 2024
    “…In recent studies, traditional machine learning and deep learning algorithms have been implemented to detect fake job postings; this research aims to use two transformer-based deep learning models, i.e., Bidirectional Encoder Representations from Transformers (BERT) and Robustly Optimized BERT-Pretraining Approach (RoBERTa) to detect fake job postings precisely. …”
  14. 134

    A Clinically Interpretable Approach for Early Detection of Autism Using Machine Learning With Explainable AI by Oishi Jyoti (21593819)

    Published 2025
    “…After handling missing values, balancing the dataset, and analyzing the classifier’s performance, it is found that tree-based algorithms, particularly RF, perform better for all the datasets. …”
  15. 135
  16. 136

    Information warfare. (c2015) by Sai, Mohamed El

    Published 2015
    “…In addition, we will implement the algorithm and compare its performance to other detection and recovery algorithms.…”
    Get full text
    Get full text
    masterThesis
  17. 137

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura, Habiba

    Published 2023
    “…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
    Get full text
    Get full text
    Get full text
    article
  18. 138

    Turbo-charging dominating set with an FPT subroutine by Abu-Khzam, Faisal N.

    Published 2017
    “…Turbo-charging is a recent algorithmic technique that is based on the fixed-parameter tractability of the dynamic versions of some problems as a way to improve heuristics. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  19. 139
  20. 140

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura Habiba (17808302)

    Published 2023
    “…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”