Showing 141 - 160 results of 392 for search '(( data lasso algorithm ) OR ((( developing based algorithm ) OR ( element data algorithm ))))*', query time: 0.16s Refine Results
  1. 141

    Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers by Ali Sharida (17947847)

    Published 2023
    “…The OSF detection and localization algorithm is implemented based on the dynamic response difference between the physical system and its DT. …”
  2. 142
  3. 143

    A heuristics for HTTP traffic identification in measuring user dissimilarity by Adeyemi R. Ikuesan (14157123)

    Published 2020
    “…The study utilizes HTTP request method of GET filtering, to develop a heuristic algorithm to identify user-initiated requests. …”
  4. 144

    Behavior-Based Machine Learning Approaches to Identify State-Sponsored Trolls on Twitter by Saleh Alhazbi (16869960)

    Published 2020
    “…We have proposed a set of behavioral features of users' activities on Twitter. Based on these features, we developed four classification models to identify political troll accounts, these models are based on decision tree, random forest, Adaboost, and gradient boost algorithms. …”
  5. 145
  6. 146

    Secrecy Performance of Decode-and-Forward Based Hybrid RF/VLC Relaying Systems by Jaber Al-Khori (16855470)

    Published 2019
    “…<p dir="ltr">In this paper, we consider the secrecy of a hybrid radio frequency (RF)/visible light communication (VLC) system equipped with decode-and-forward relaying. We develop physical layer security algorithms that mitigate eavesdropping on both RF and VLC networks based on zero-forcing beamforming techniques. …”
  7. 147
  8. 148

    DRL-Based IRS-Assisted Secure Hybrid Visible Light and mmWave Communications by Danya A. Saifaldeen (19498705)

    Published 2024
    “…The DDPG algorithm can adapt to channel variations due to user movement and high-dimensional factors. …”
  9. 149
  10. 150

    A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis by Alaa Abd-Alrazaq (17430900)

    Published 2021
    “…Specifically, we used a clustering algorithm to group published articles based on the similarity of their abstracts to identify research hotspots and current research directions. …”
  11. 151

    Nonlinear Control of Brushless Dual-Fed Induction Generator With a Flywheel Energy Storage System for Improved System Performance by Mohammed Hamidat (3722086)

    Published 2025
    “…In the first stage, a robust Sliding Mode Control (SMC)-based nonlinear decoupled control algorithm is designed to efficiently regulate BDFIG operation. …”
  12. 152

    Identification of physically based models of residential air-conditioners for direct load control management by El-Ferik, S.

    Published 2004
    “…An online maximum-likelihood based identification algorithm is developed for A/C, the required hardware and system instrumentation is detailed. …”
    Get full text
    Get full text
    article
  13. 153
  14. 154

    Correlation Clustering with Overlaps by Fakhereldine, Amin

    Published 2020
    “…Moreover, we allow the new vertex splitting operation, which allows the resulting clusters to overlap. In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  15. 155

    Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las... by Masurkar, Faeez

    Published 2020
    “…In view of this, an innovative signal processing technique called a self-adaptive-smart algorithm (SASA) was designed and developed. In SASA, the incident wave that is the first coming wave-packet is taken as a mother wavelet. …”
    Get full text
  16. 156

    Minimizing using BBO and DFO methods by El Zeghondy, Jean

    Published 2022
    “…The goal of this thesis is to develop two MATLAB codes for the numerical algorithm of [1]. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  17. 157

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone by Saeed Ullah Jan (9079260)

    Published 2021
    “…This issue of security risk can be minimized conspicuously by developing a robust authentication scheme for IoD deployment military drones. …”
  18. 158

    Nested ensemble selection: An effective hybrid feature selection method by Kamalov, Firuz

    Published 2023
    “…The NES algorithm achieves perfect precision on the synthetic data and near optimal accuracy on the real-life data. …”
    Get full text
    article
  19. 159
  20. 160

    VEGAWES: variational segmentation on whole exome sequencing for copy number detection by Samreen Anjum (19651882)

    Published 2015
    “…We compared our results with two other segmentation algorithms and assessed the performance based on accuracy and time. …”