Showing 21 - 40 results of 44 for search '(( complement cc3d algorithm ) OR ((( second main algorithm ) OR ( neural coding algorithm ))))', query time: 0.13s Refine Results
  1. 21

    Color edge enhancement based fuzzy segmentation of license plates by Syed, Y.A.

    Published 2005
    “…The proposed ALPR technique consists of two main modules: plate locating module and plate segmentation module. …”
    Get full text
    Get full text
    article
  2. 22

    A novel hybrid methodology for fault diagnosis of wind energy conversion systems by Khaled Dhibi (16891524)

    Published 2023
    “…Feature selection pre-processing is an important step to increase the accuracy of the classification algorithm and decrease the dimensionality of a dataset. …”
  3. 23
  4. 24

    Loss Model Control for Efficiency Optimization and Advanced Sliding Mode Controllers with Chattering Attenuation for Five-Phase Induction Motor Drive by Hassen Moussa (19759911)

    Published 2024
    “…<p dir="ltr">This paper proposes firstly a Second Order Sliding Mode Control (SOSMC) based on a Super Twisting Algorithm (STA) (SOSMC-STA) combined with a Direct Field-Oriented Control (DFOC) strategy of a Five-Phase Induction Motor (FPIM). …”
  5. 25

    Towards a self-powering greenhouse using semi-transparent PV: Utilizing hybrid BESS-hydrogen energy storage system by Mohammadreza Gholami (17032317)

    Published 2024
    “…Second, by employing a comprehensive approach with the GBO algorithm, the research examines various scenarios as a multi-objective optimization problem, balancing economic considerations such as net present value (NPV) and energy dependency (ED). …”
  6. 26

    Towards a self-powering greenhouse using semi-transparent PV: Utilizing hybrid BESS-hydrogen energy storage system by Gholami, Mohammadreza

    Published 2025
    “…Second, by employing a comprehensive approach with the GBO algorithm, the research examines various scenarios as a multi-objective optimization problem, balancing economic considerations such as net present value (NPV) and energy dependency (ED). …”
    Get full text
    Get full text
    Get full text
    article
  7. 27
  8. 28

    R-CONV++: uncovering privacy vulnerabilities through analytical gradient inversion attacks by Tamer Ahmed Eltaras (22565414)

    Published 2025
    “…Building on this foundation, the second algorithm extends this analytical approach to support high-dimensional input data, substantially enhancing its utility across complex real-world datasets. …”
  9. 29

    CEAP by Abdel Wahab, Omar

    Published 2016
    “…Nonetheless, the applicability of the current detection mechanisms in the deployed vehicular networks is hindered by two main challenges imposed by the special characteristics of VANETs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  10. 30
  11. 31
  12. 32

    Oversampling techniques for imbalanced data in regression by Samir Brahim Belhaouari (9427347)

    Published 2024
    “…For tabular data, we also present the Auto-Inflater neural network, utilizing an exponential loss function for Autoencoders. …”
  13. 33
  14. 34
  15. 35

    Agent-Based Reactive Geographic Routing Protocol for Internet of Vehicles by Mazouzi, Mohamed

    Published 2023
    “…The design of an efficient routing algorithm for Internet of Vehicles (IoV) is a challenging research issue due to the inherent characteristics of IoV network, such as high-speed mobility of nodes, frequent topology change, link instability, and the presence of radio obstacles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  16. 36

    Common weaving approach in mainstream languages for software security hardening by Alhadidi, Dima

    Published 2013
    “…In the first approach, we prove them according to the rules and algorithms provided in this paper. In the second approach, we accommodate Kniesel's discipline that ensures that security solutions specified by our approach are applied at all and only the required points in source code, taking into consideration weaving interactions and interferences. …”
    Get full text
    Get full text
    Get full text
    article
  17. 37
  18. 38

    Software defect prediction. (c2019) by Moussa, Rebecca

    Published 2019
    “…It is divided into two main tracks. One that focuses on predicting defect in software modules using a hybrid heuristic - a combination of Particle Swarm Optimization (PSO) and Genetic Algorithms (GA). …”
    Get full text
    Get full text
    Get full text
    masterThesis
  19. 39
  20. 40