Search alternatives:
data detection » data injection (Expand Search)
Showing 341 - 360 results of 602 for search '(( data detection algorithm ) OR ( based optimization algorithm ))', query time: 0.11s Refine Results
  1. 341

    Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers by Ali Sharida (17947847)

    Published 2023
    “…Then, the DT is used for the diagnosis and tolerance of open-switch faults (OSFs) and faults related to voltage and current sensors or for sensorless control. The OSF detection and localization algorithm is implemented based on the dynamic response difference between the physical system and its DT. …”
  2. 342
  3. 343

    Autism Detection of MRI Brain Images Using Hybrid Deep CNN With DM-Resnet Classifier by JAIN, SWETA

    Published 2023
    “…The hyper parameters are optimized with DM optimization algorithm which improves the accuracy of classifier. …”
    Get full text
    Get full text
  4. 344

    Integrated Energy Optimization and Stability Control Using Deep Reinforcement Learning for an All-Wheel-Drive Electric Vehicle by Reza Jafari (3494018)

    Published 2025
    “…In addition to the deployment without requiring an explicit model of the plant, the simulation results demonstrate that the proposed solution modifies vehicle dynamics and maneuverability in most cases compared to the model-based conventional controller. Furthermore, the reduction in sideslip angle, excellent traction through minimizing tire slip ratio, avoiding oversteering and understeering, and maintaining an acceptable range of energy optimization are demonstrated for DRL controllers, especially for the TD3 and CL TD3 algorithms.…”
  5. 345
  6. 346

    Large-scale annotation dataset for fetal head biometry in ultrasound images by Mahmood Alzubaidi (15740693)

    Published 2023
    “…Its detailed annotations, broad compatibility, and ethical compliance make it a highly reusable and adaptable tool for the development of algorithms aimed at improving maternal and Fetal health.…”
  7. 347

    Efficient Approximate Conformance Checking Using Trie Data Structures by Awad, Ahmed

    Published 2021
    “…By encoding the proxy behavior using a trie data structure, we obtain a logarithmically reduced search space for alignment computation compared to a set-based representation. We show how our algorithm supports the definition of a budget for alignment computation and also augment it with strategies for meta-heuristic optimization and pruning of the search space. …”
    Get full text
    Get full text
    Get full text
  8. 348
  9. 349
  10. 350
  11. 351

    A cluster-based model for QoS-OLSR protocol by Otrok, Hadi

    Published 2017
    “…Therefore, we propose a novel clustering algorithm and a relay node selection based on different combinations of metrics, such as connectivity, residual energy, and bandwidth. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  12. 352

    Intelligent route to design efficient CO<sub>2</sub> reduction electrocatalysts using ANFIS optimized by GA and PSO by Majedeh Gheytanzadeh (17541927)

    Published 2022
    “…The primary purpose of this study is to establish a new model through machine learning methods; namely, adaptive neuro-fuzzy inference system (ANFIS) combined with particle swarm optimization (PSO) and genetic algorithm (GA) for the prediction of *CO (the key intermediate) adsorption energy as the efficiency metric. …”
  13. 353

    Hybridizing rule-based power system stabilizers with geneticalgorithms by Abido, M.A.

    Published 1999
    “…The proposed approach uses genetic algorithms (GA) to search for optimal settings of rule-based power system stabilizer (RBPSS) parameters. …”
    Get full text
    Get full text
    article
  14. 354
  15. 355

    Land Use/Land Cover Changes Impact on Groundwater Level and Quality in the Northern Part of the United Arab Emirates by Elmahdy, Samy

    Published 2020
    “…Each pair of enhanced LULC maps (1990–2000, 2000–2010, 2010–2018, and 1990–2018) were used as input data for an image difference algorithm to monitor LULC changes. …”
    Get full text
    article
  16. 356

    Coordinated design of robust excitation and TCSC-based damping controllers by Abido, M.A.

    Published 2003
    “…The real-coded genetic algorithm (RCGA) is employed to search for optimal controller parameters. …”
    Get full text
    Get full text
    article
  17. 357

    Loss Model Control for Efficiency Optimization and Advanced Sliding Mode Controllers with Chattering Attenuation for Five-Phase Induction Motor Drive by Hassen Moussa (19759911)

    Published 2024
    “…<p dir="ltr">This paper proposes firstly a Second Order Sliding Mode Control (SOSMC) based on a Super Twisting Algorithm (STA) (SOSMC-STA) combined with a Direct Field-Oriented Control (DFOC) strategy of a Five-Phase Induction Motor (FPIM). …”
  18. 358

    A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study by Masurkar, Faeez

    Published 2022
    “…Further, As the quality of received signals differs at different sensing points as a result of the surface conditions of the specimen, the Self Adaptive Smart Algorithm (SASA) method was adopted to filter out the noise and accurately pinpoint the defect reflected wave packet which ultimately aids in better detection and localization. …”
    Get full text
  19. 359

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures by JUMA, MAZEN GHAZI

    Published 2021
    “…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …”
    Get full text
  20. 360

    The use of multi-task learning in cybersecurity applications: a systematic literature review by Shimaa Ibrahim (22155739)

    Published 2024
    “…Five critical applications, such as network intrusion detection and malware detection, were identified, and several tasks used in these applications were observed. …”