Showing 81 - 100 results of 135 for search '(((( implement control algorithm ) OR ( elements each algorithm ))) OR ( level coding algorithm ))', query time: 0.12s Refine Results
  1. 81

    Enhancing Scalability of Fast Electric Vehicle Charging Stations: Solutions for AC–DC Side Integration and Regulation by Ali Sharida (17947847)

    Published 2024
    “…The proposed solutions focus on streamlining and regulating the connection process for integrating a new active front-end rectifier (AFR) with existing AFRs at the high-voltage dc-link side, without requiring detailed knowledge of their specifications, such as control algorithms, switching frequencies, topologies, and modulation techniques. …”
  2. 82
  3. 83
  4. 84

    An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System by Alkhatib, Osama

    Published 2019
    “…Meaning no “perfect” machine learning algorithm that will produce good results at particular problem, in fact for each type of problem a specific algorithm is suited and might achieves good outcome, while another algorithm fails heavily. …”
    Get full text
  5. 85

    Assessment of static pile design methods and non-linear analysis of pile driving by Abou-Jaoude, Grace G.

    Published 2006
    “…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  6. 86

    The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions by Abdulmalik Alwarafy (17984104)

    Published 2022
    “…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
  7. 87

    Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique by Syeda Tayyaba Bukhari (21842078)

    Published 2024
    “…<p dir="ltr">Blockchain technology enables users to control and record their cryptocurrency transactions through the use of digital wallets. …”
  8. 88
  9. 89

    Efficient Seismic Volume Compression using the Lifting Scheme by Khene, M. F.

    Published 2000
    “…Finally a runlength plus a Huffman encoding are applied for binary coding of the quantized coefficients.…”
    Get full text
    article
  10. 90
  11. 91
  12. 92

    A quadratic kernel for 3-set packing by Abu-Khzam, Faisal N.

    Published 2017
    “…Such parameterized reductions are known as kernelization algorithms, and each reduced instance is called a problem kernel. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 93

    Applications of fast fourier transform in the integrity evaluation of deep foundations by Abi Shdid, Caesar

    Published 2016
    “…The widespread use of drilled shafts and the large and critical nature of loads they carry make post-construction quality control a rather important aspect of inspections. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  14. 94
  15. 95
  16. 96

    Downlink channel estimation for IMT-DS by Faisal, S.

    Published 2001
    “…To obtain channel estimates during pilot symbols, we propose a chip level adaptive channel estimation which performs better than the conventional method. …”
    Get full text
    Get full text
    article
  17. 97
  18. 98

    Impact Of Inspection Errors On The Performance Measures Of A General: Repeat Inspection Plan by Duffuaa, S. O.

    Published 2020
    “…The impact of the errors is studied by conducting sensitivity analysis on the errors utilizing computer software which implements an algorithm that determines the optimal parameters of the model of the plan. …”
    Get full text
    article
  19. 99

    XBeGene: Scalable XML Documents Generator by Example Based on Real Data by Harazaki, Manami

    Published 2012
    “…Inspired by the query-by-example paradigm in information retrieval, Our generator system i)allows the user to provide her own sample XML documents as input, ii) analyzes the structure, occurrence frequencies, and content distributions for each XML element in the user input documents, and iii) produces synthetic XML documents which closely concur, in both structural and content features, to the user's input data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  20. 100

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector by AL HAMMADI, SUMAYYA ABDULLA

    Published 2022
    “…The findings from this study will help implement a system that will significantly reduce fraud in the procurement sector. …”
    Get full text