يعرض 81 - 100 نتائج من 315 نتيجة بحث عن '(((( implement making algorithm ) OR ( elements based algorithm ))) OR ( level using algorithm ))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 81

    Real-Time Performance Evaluation of a Genetic Algorithm Based Fuzzy Logic Controller for IPM Motor Drives حسب Nasir Uddin, M.

    منشور في 2005
    "…The proposed GFLC is developed to have less computational burden, which makes it suitable for real-time implementation. The parameters for the GFLC are tuned by genetic algorithm (GA). …"
    احصل على النص الكامل
    article
  2. 82

    New Hardware Algorithms and Designs for Montgomery Modular Inverse Computation in Galois Fields GF(p) and GF(2n) حسب Gutub, Adnan

    منشور في 2002
    "…We adjust and modify a GF(2n) Montgomery inverse algorithm to benefit from multi-bit shifting hardware features making it very similar to the proposed best design of GF(p) inversion hardware. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  3. 83

    A reduced model for phase-change problems with radiation using simplified PN approximations حسب Belhamadia, Youssef

    منشور في 2025
    "…To solve the coupled equations, we implement a second-order implicit scheme for the time integration and a mixed finite element method for the space discretization. A Newton-based algorithm is also adopted for solving the nonlinear systems resulting from the considered monolithic approach. …"
    احصل على النص الكامل
    article
  4. 84

    Bird’s Eye View feature selection for high-dimensional data حسب Samir Brahim Belhaouari (16855434)

    منشور في 2023
    "…This approach is inspired by the natural world, where a bird searches for important features in a sparse dataset, similar to how a bird search for sustenance in a sprawling jungle. BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …"
  5. 85
  6. 86
  7. 87
  8. 88
  9. 89

    Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study حسب Alkhodari, Mohanad Ahmed

    منشور في 2021
    "…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …"
    احصل على النص الكامل
    article
  10. 90
  11. 91

    Analysis of Multi-User-Based UAV System With Outdated CSI حسب Parvez Shaik (21633041)

    منشور في 2024
    "…Optimization of UAV location and altitude is performed through a limited-memory Broyden-Fletcher-Goldfarb-Shanno (LBFGS) algorithm to attain minimum OP (MOP). Results illustrate optimal performance dependent on the channel correlation parameters, antenna elements, and fading conditions. …"
  12. 92
  13. 93
  14. 94

    Simultaneous stabilisation of power systems using geneticalgorithms حسب Abdel-Magid, Y.L.

    منشور في 1997
    "…The paper considers the simultaneous stabilisation of a power system over a wide range of operating conditions via a single power system stabiliser using genetic algorithms. A power system operating at various load levels is treated as a finite set of plants. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 95

    Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants حسب Surbhi Choudhary (21633701)

    منشور في 2024
    "…It also provides implications for tech-managers and algorithm designers to build effective voice technology for superior user experience.…"
  16. 96

    Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies حسب Jebbaoui, Hussein

    منشور في 2015
    "…First, our approach resolves the complexity of policies by elaborating an intermediate set-based representation to which the elements of XACML are automatically converted. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 97

    Approximate XML structure validation based on document–grammar tree similarity حسب Tekli, Joe

    منشور في 2015
    "…Our approach exploits the concept of tree edit distance, introducing a novel edit distance recurrence and dedicated algorithms to effectively compare XML documents and grammar structures, modeled as ordered labeled trees. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 98

    A Survey of Data Clustering Techniques حسب Sobeh, Salma

    منشور في 2023
    "…This survey examines seven widely recognized clustering techniques, namely k-means, G-means, DBSCAN, Agglomerative hierarchical clustering, Two-stage density (DBSCAN and k-means) algorithm, Two-levels (DBSCAN and hierarchical) clustering algorithm, and Two-stage MeanShift and K-means clustering algorithm and compares them over a real dataset - The Blockchain dataset, including prominent cryptocurrencies like Binance, Bitcoin, Doge, and Ethereum, under several metrics such as silhouette coefficient, Calinski-Harabasz, Davies-Bouldin Index, time complexity, and entropy.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  19. 99

    Efficient Seismic Volume Compression using the Lifting Scheme حسب Khene, M. F.

    منشور في 2000
    "…A separable 3-D discrete wavelet transform (DWT) using long biorthogonal filters is used. The computation efficiency of the DWT is improved by factoring the wavelet filters using the lifting scheme. …"
    احصل على النص الكامل
    article
  20. 100

    Cyberbullying Detection in Arabic Text using Deep Learning حسب ALBAYARI, REEM RAMADAN SA’ID

    منشور في 2023
    "…Therefore, this study aims to evaluate several versions of Recurrent Neural Networks (RNNs) and Feedforward Neural Networks (FNNs) for detecting cyberbullying in the Arabic language. Although these algorithms are widely used in text classification and outperform the performance of classical classifiers, many have been extensively investigated in other domains such as sentiment analysis and dialect identification, as well as cyberbullying detection in English text. …"
    احصل على النص الكامل