Showing 41 - 60 results of 96 for search '(( complement c5 algorithm ) OR ((( second modeling algorithm ) OR ( neural coding algorithm ))))', query time: 0.11s Refine Results
  1. 41

    Loss Model Control for Efficiency Optimization and Advanced Sliding Mode Controllers with Chattering Attenuation for Five-Phase Induction Motor Drive by Hassen Moussa (19759911)

    Published 2024
    “…<p dir="ltr">This paper proposes firstly a Second Order Sliding Mode Control (SOSMC) based on a Super Twisting Algorithm (STA) (SOSMC-STA) combined with a Direct Field-Oriented Control (DFOC) strategy of a Five-Phase Induction Motor (FPIM). …”
  2. 42

    Exploratory risk prediction of type II diabetes with isolation forests and novel biomarkers by Yousef, Hibba

    Published 2024
    “…The second model outperformed the first across all evaluation metrics, particularly for F1 score and recall, which were increased from 0.61 ± 0.05 to 0.81 ± 0.05 and 0.57 ± 0.06 to 0.81 ± 0.08, respectively. …”
    Get full text
  3. 43
  4. 44
  5. 45

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…In addition, it implies carrying out the training and testing process in each phase. Since the best model is obtained from training, each time it is performed for a given phase, the model is adjusted to detect new attacks. …”
    Get full text
  6. 46

    Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn... by Mohamed, AlShuweihi

    Published 2020
    “…The second major contribution is the design and construction of a Logistic Regression (LR) ML binary classification model with an accuracy of 87% and F1-score of 89%. …”
    Get full text
  7. 47

    On the Provisioning of Ultra-Reliable Low-Latency Services in IoT Networks with Multipath Diversity by Sweidan, Zahraa

    Published 2020
    “…Simulation results are presented for both parts of the thesis to illustrate the effectiveness of the proposed solutions and algorithms in comparison with optimal solutions and baseline algorithms.…”
    Get full text
    Get full text
    Get full text
    masterThesis
  8. 48
  9. 49
  10. 50
  11. 51
  12. 52
  13. 53

    A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining by Koen Schaaf (14778139)

    Published 2021
    “…Third, a text mining algorithm has been implemented. Fourth, the systematic approach has been modeled using business process modeling notation. …”
  14. 54

    Adaptive temperature control of a reverse flow process by using reinforcement learning approach by A. Binid (22046054)

    Published 2024
    “…Additionally, a second algorithm is presented to enhance the implementability of the reinforcement learning algorithm from a practical perspective. …”
  15. 55

    Impact of Charging Electric Vehicles under Different State of Charge Levels and Extreme Conditions by Claude Ziad El-Bayeh (17542284)

    Published 2021
    “…This paper defines extreme conditions as the state of a load or network that breaks the limits of the constraints in an optimization model. Once these constraints are violated, the optimization algorithm might not work correctly and might not converge to a feasible solution, especially when the complexity of the system increases and includes nonlinearities. …”
  16. 56
  17. 57

    Vibration suppression in a cantilever beam using a string-type vibration absorber by Issa, Jimmy S.

    Published 2017
    “…The string is rigidly connected to the fixed end of the beam and through a spring and damper to a second point on the beam. The finite element method is used to model the system and a reduced order model is obtained through modal reduction performed on both the string and the beam. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  18. 58

    A modified coronavirus herd immunity optimizer for capacitated vehicle routing problem by Abu Zitar, Raed

    Published 2021
    “…To evaluate the modified CHIO, twosets of data sets are used: the first data set has ten Synthetic CVRP models while the second is an ABEFMPdata set which has 27 instances with different models. …”
    Get full text
  19. 59

    Uplink Noma in UAV-Assisted IoT Networks by Mrad, Ali

    Published 2022
    “…The second device is then selected using a heuristic algorithm based on prioritizing devices with higher bit rate requirements and strict deadlines. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  20. 60