يعرض 21 - 40 نتائج من 432 نتيجة بحث عن '(((( implementing ii algorithm ) OR ( element mapping algorithm ))) OR ( level using algorithm ))', وقت الاستعلام: 0.16s تنقيح النتائج
  1. 21

    Real-Time Selective Harmonic Mitigation Technique for Power Converters Based on the Exchange Market Algorithm حسب Abraham Marquez Alcaide (18582451)

    منشور في 2020
    "…In this paper, for the first time, a real-time implementation of SHM using an off-the-shelf mid-range microcontroller is presented and tested. …"
  2. 22

    Implementation and Comparison of Particle Swarm Optimization and Genetic Algorithm Techniques in Combined Economic Emission Dispatch of an Independent Power Plant حسب Shahbaz Hussain (9765320)

    منشور في 2019
    "…Practical constraints such as generator limits and power balance were considered. Two contemporary metaheuristic techniques, particle swarm optimization (PSO) and genetic algorithm (GA), have were simultaneously implemented for combined economic emission dispatch (CEED) of an independent power plant (IPP) situated in Pakistan for different load demands. …"
  3. 23
  4. 24

    Experimental Investigation and Comparative Evaluation of Standard Level Shifted Multi-Carrier Modulation Schemes With a Constraint GA Based SHE Techniques for a Seven-Level PUC Inv... حسب Atif Iqbal (5504636)

    منشور في 2019
    "…The investigation that involves analysis and comparison is done for obtaining reduced total harmonic distortion (THD) by using different level-shifted multicarrier SPWM schemes along with proposed GA-based SHE. …"
  5. 25

    Land Use/Land Cover Changes Impact on Groundwater Level and Quality in the Northern Part of the United Arab Emirates حسب Elmahdy, Samy

    منشور في 2020
    "…This study aims to develop an integrated approach for mapping and monitoring land use/land cover (LULC) changes and to investigate the impacts of LULC changes and population growth on groundwater level and quality using Landsat images and hydrological information in a Geographic information system (GIS) environment. …"
    احصل على النص الكامل
    article
  6. 26
  7. 27
  8. 28

    Exploring Sentiment Analysis using Different Machine Learning Algorithms on Dialectal Arabic حسب AL MANSOORI, MOUZA

    منشور في 2021
    "…The study explores sentiment analysis using different machine learning algorithms on dialectal Arabic text dataset. …"
    احصل على النص الكامل
  9. 29

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems حسب Almajed, Rasha

    منشور في 2022
    "…According to the findings of several studies, the framework is significantly more effective than conventional methods in maintaining high levels of privacy. In addition, the framework outperforms conventional detection algorithms in words of detection rate, the rate of the false positive, and calculation time, respectively.…"
    احصل على النص الكامل
    احصل على النص الكامل
  10. 30

    Multimodal EEG and Keystroke Dynamics Based Biometric System Using Machine Learning Algorithms حسب Arafat Rahman (8065562)

    منشور في 2021
    "…A machine learning classification pipeline is developed using multi-domain feature extraction (time, frequency, time-frequency), feature selection (Gini impurity), classifier design, and score level fusion. …"
  11. 31

    New Hardware Algorithms and Designs for Montgomery Modular Inverse Computation in Galois Fields GF(p) and GF(2n) حسب Gutub, Adnan

    منشور في 2002
    "…We also propose a scalable and unified architecture for a Montgomery inverse hardware that operates in both GF(p) and GF(2n) fields. We adjust and modify a GF(2n) Montgomery inverse algorithm to benefit from multi-bit shifting hardware features making it very similar to the proposed best design of GF(p) inversion hardware. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  12. 32
  13. 33

    An Optimized Feature Selection Technique in Diversified Natural Scene Text for Classification Using Genetic Algorithm حسب Ghulam Jillani Ansari (16896342)

    منشور في 2021
    "…Second, a feature level fusion approach is used to combine the features. …"
  14. 34

    Activity-level space scheduling حسب Zouein, Pierrette P.

    منشور في 1992
    "…Its output layouts can be used to refine individual robot's trajectories using traditional path-planning algorithms.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  15. 35
  16. 36

    Portfolio Selection Problem Using CVaR Risk Measures Equipped with DEA, PSO, and ICA Algorithms حسب Abdelouahed Hamdi (14158899)

    منشور في 2022
    "…This was displayed the return of the portfolio produced using the DEA-Mean-CVaR model increased because the investment proposal was basedon the stock with the highest expected return and was effective at three risk levels. …"
  17. 37

    Calibration of building model based on indoor temperature for overheating assessment using genetic algorithm: Methodology, evaluation criteria, and case study حسب Mutasim Baba, Fuad

    منشور في 2022
    "…Maximum Absolute Difference (MAD), a new metric, that calculates the maximum absolute difference between simulated and measured hourly indoor temperatures, Root Mean Square Error (RMSE), Normalized Mean Bias Error (NMBE) were used as the evaluation criteria. Another new metric is introduced, 1 ◦C Percentage Error criterion that calculates the percentage of the number of hours with an error over 1 ◦C during the cali bration period, to select the best solutions from the Pareto Front solutions. 0.5 ◦C Percentage Error criterion is also used for the level of accuracy the model can achieve. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  18. 38
  19. 39

    Topics in graph algorithms حسب Abu-Khzam, Faisal Nabih

    منشور في 2003
    "…Being fixed-parameter tractable, we develop an algorithm that solves it in time O(5k + n2) where k is the input parameter. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  20. 40

    Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm حسب El-Kassar, A. N.

    منشور في 2005
    "…To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject