يعرض 21 - 40 نتائج من 44 نتيجة بحث عن '(( complementary ipca algorithm ) OR ((( second main algorithm ) OR ( neural coding algorithm ))))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 21

    Color edge enhancement based fuzzy segmentation of license plates حسب Syed, Y.A.

    منشور في 2005
    "…The proposed ALPR technique consists of two main modules: plate locating module and plate segmentation module. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 22

    A novel hybrid methodology for fault diagnosis of wind energy conversion systems حسب Khaled Dhibi (16891524)

    منشور في 2023
    "…Feature selection pre-processing is an important step to increase the accuracy of the classification algorithm and decrease the dimensionality of a dataset. …"
  3. 23
  4. 24

    Loss Model Control for Efficiency Optimization and Advanced Sliding Mode Controllers with Chattering Attenuation for Five-Phase Induction Motor Drive حسب Hassen Moussa (19759911)

    منشور في 2024
    "…<p dir="ltr">This paper proposes firstly a Second Order Sliding Mode Control (SOSMC) based on a Super Twisting Algorithm (STA) (SOSMC-STA) combined with a Direct Field-Oriented Control (DFOC) strategy of a Five-Phase Induction Motor (FPIM). …"
  5. 25

    Towards a self-powering greenhouse using semi-transparent PV: Utilizing hybrid BESS-hydrogen energy storage system حسب Mohammadreza Gholami (17032317)

    منشور في 2024
    "…Second, by employing a comprehensive approach with the GBO algorithm, the research examines various scenarios as a multi-objective optimization problem, balancing economic considerations such as net present value (NPV) and energy dependency (ED). …"
  6. 26

    Towards a self-powering greenhouse using semi-transparent PV: Utilizing hybrid BESS-hydrogen energy storage system حسب Gholami, Mohammadreza

    منشور في 2025
    "…Second, by employing a comprehensive approach with the GBO algorithm, the research examines various scenarios as a multi-objective optimization problem, balancing economic considerations such as net present value (NPV) and energy dependency (ED). …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 27
  8. 28

    R-CONV++: uncovering privacy vulnerabilities through analytical gradient inversion attacks حسب Tamer Ahmed Eltaras (22565414)

    منشور في 2025
    "…Building on this foundation, the second algorithm extends this analytical approach to support high-dimensional input data, substantially enhancing its utility across complex real-world datasets. …"
  9. 29

    CEAP حسب Abdel Wahab, Omar

    منشور في 2016
    "…Nonetheless, the applicability of the current detection mechanisms in the deployed vehicular networks is hindered by two main challenges imposed by the special characteristics of VANETs. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 30
  11. 31
  12. 32

    Oversampling techniques for imbalanced data in regression حسب Samir Brahim Belhaouari (9427347)

    منشور في 2024
    "…For tabular data, we also present the Auto-Inflater neural network, utilizing an exponential loss function for Autoencoders. …"
  13. 33
  14. 34
  15. 35

    Agent-Based Reactive Geographic Routing Protocol for Internet of Vehicles حسب Mazouzi, Mohamed

    منشور في 2023
    "…The design of an efficient routing algorithm for Internet of Vehicles (IoV) is a challenging research issue due to the inherent characteristics of IoV network, such as high-speed mobility of nodes, frequent topology change, link instability, and the presence of radio obstacles. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 36

    Common weaving approach in mainstream languages for software security hardening حسب Alhadidi, Dima

    منشور في 2013
    "…In the first approach, we prove them according to the rules and algorithms provided in this paper. In the second approach, we accommodate Kniesel's discipline that ensures that security solutions specified by our approach are applied at all and only the required points in source code, taking into consideration weaving interactions and interferences. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 37
  18. 38

    Software defect prediction. (c2019) حسب Moussa, Rebecca

    منشور في 2019
    "…It is divided into two main tracks. One that focuses on predicting defect in software modules using a hybrid heuristic - a combination of Particle Swarm Optimization (PSO) and Genetic Algorithms (GA). …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  19. 39
  20. 40