Showing 61 - 80 results of 453 for search '(((( implement based algorithm ) OR ( experiments each algorithm ))) OR ( levels using algorithm ))', query time: 0.14s Refine Results
  1. 61

    An Artificial Neural Network for Online Tuning of Genetic Algorithm Based PI Controller for Interior Permanent Magnet Synchronous Motor–Drive by Rahman, M. A.

    Published 2006
    “…An artificial neural network (ANN) for online tuning of a genetic algorithm based PI controller for interior permanent magnet synchronous motor (IPMSM) drive is presented in this paper. …”
    Get full text
    article
  2. 62
  3. 63

    Optimum Partition of Power Networks Using Singular Value Decomposition and Affinity Propagation by Maymouna Ez Eddin (21633650)

    Published 2024
    “…The adopted methodology aims to enhance partitioning efficiency substantially while preserving a high level of partitioning quality. The proposed framework is verified on IEEE 14, 39, 118, and 2000-bus systems and compared to nine other well-known and widely used clustering techniques, including K-Means and Gaussian Mixture models. …”
  4. 64
  5. 65
  6. 66

    Boosting the visibility of services in microservice architecture by Ahmet Vedat Tokmak (17773479)

    Published 2023
    “…These assessments can be performed by means of a live health-check service, or, alternatively, by making a prediction of the current state of affairs with the application of machine learning-based approaches. In this research, we evaluate the performance of several classification algorithms for estimating the quality of microservices using the QWS dataset containing traffic data of 2505 microservices. …”
  7. 67

    Improvement Algorithm for Limited Space Scheduling by Zouein, Pierrette

    Published 2001
    “…The model characterizes resource space requirements over time and establishes a time-space relationship for each activity in the schedule, based on alternative resource levels. An example illustrates the presented algorithm that generates a feasible space schedule.…”
    Get full text
    Get full text
    article
  8. 68

    Scalable Parallel Algorithms for FPT Problems by Abu-Khzam, Faisal N.

    Published 2006
    “…To accomplish this, an efficient sequential algorithm and various forms of parallel algorithms are devised, implemented, and compared. …”
    Get full text
    Get full text
    Get full text
    article
  9. 69
  10. 70
  11. 71

    Predicting Plasma Vitamin C Using Machine Learning by Daniel Kirk (17302798)

    Published 2022
    “…<p dir="ltr">Precision Nutrition makes use of personal information about individuals to produce nutritional recommendations that have more utility than general population level recommendations. …”
  12. 72
  13. 73
  14. 74
  15. 75
  16. 76

    Particle swarm optimization algorithm: review and applications by Abualigah, Laith

    Published 2024
    “…Particle swarm optimization (PSO) is a heuristic global optimization technique and an optimization algorithm that is swarm intelligence-based. It is based on studies into the movement of bird flocks. …”
    Get full text
  17. 77

    Empirical comparison of regression test selection algorithms by Mansour, Nashat

    Published 2001
    “…These criteria are: number of selected test cases, execution time, precision, inclusiveness, preprocessing requirements, type of maintenance, level of testing, and type of approach. The empirical results show that the five algorithms can be used for different requirements of regression testing. …”
    Get full text
    Get full text
    Get full text
    article
  18. 78

    Hardware design and VLSI implementation of a byte-wise CRCgenerator chip by Sait, Sadiq M.

    Published 1995
    “…The algorithm is based on the work presented by Perez, Wismer and Becker (1983) in which a software implementation was proposed. …”
    Get full text
    Get full text
    article
  19. 79
  20. 80

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …”
    Get full text