يعرض 201 - 220 نتائج من 763 نتيجة بحث عن '(( data processing algorithm ) OR ((( develop a algorithm ) OR ( movement update algorithm ))))', وقت الاستعلام: 0.15s تنقيح النتائج
  1. 201

    A flexible genetic algorithm-fuzzy regression approach for forecasting: The case of bitumen consumption حسب Azadeh, Ali

    منشور في 2019
    "…Design/methodology/approach In the proposed approach, the parameter tuning process is performed on all parameters of genetic algorithm (GA), and the finest coefficients with minimum errors are identified. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 202

    Prediction the performance of multistage moving bed biological process using artificial neural network (ANN) حسب Fares Almomani (12585685)

    منشور في 2020
    "…To cope with this difficult task and perform an effective and well-controlled BP operation, an artificial neural network (ANN) algorithm was developed to simulate, model, and control a three-stage (anaerobic/anoxic and MBBR) enhanced nutrient removal biological process (ENR-BP) challenging real wastewater. …"
  3. 203

    Development of multivariable PID controller gains in presence of measurement noise حسب Saab, Samer S.

    منشور في 2017
    "…The development of the proposed optimal algorithm is based on minimising a stochastic performance index in presence of erroneous initial conditions, white measurement noise, and white process noise. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 204

    Multimodal EEG and Keystroke Dynamics Based Biometric System Using Machine Learning Algorithms حسب Arafat Rahman (8065562)

    منشور في 2021
    "…These results outperform the individual modalities with a significant margin (~5%). We also developed a binary template matching-based algorithm, which gives 93.64% accuracy 6X faster. …"
  5. 205

    Developing an online hate classifier for multiple social media platforms حسب Joni Salminen (7434770)

    منشور في 2020
    "…We make our code publicly available for application in real software systems as well as for further development by online hate researchers.</p><h2>Other Information</h2> <p> Published in: Human-centric Computing and Information Sciences<br> License: <a href="https://creativecommons.org/licenses/by/4.0" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="http://dx.doi.org/10.1186/s13673-019-0205-6" target="_blank">http://dx.doi.org/10.1186/s13673-019-0205-6</a></p>…"
  6. 206
  7. 207

    Experimental Investigation and Comparative Evaluation of Standard Level Shifted Multi-Carrier Modulation Schemes With a Constraint GA Based SHE Techniques for a Seven-Level PUC Inv... حسب Atif Iqbal (5504636)

    منشور في 2019
    "…Different standard multicarrier sinusoidal pulse-width modulation techniques (SPWMs) are adapted for the generation of switching gate signals for the PUC power switches, and these SPWMs are compared with novel optimization-based selective harmonic elimination (SHE) that employs genetic algorithm (GA) for solving nonlinear SHE equation with a constraint that eliminated all third-order harmonics efficiently. …"
  8. 208

    KNNOR: An oversampling technique for imbalanced datasets حسب Ashhadul Islam (16869981)

    منشور في 2021
    "…The proposed technique called K-Nearest Neighbor OveRsampling approach (KNNOR) performs a three step process to identify the critical and safe areas for augmentation and generate synthetic data points of the minority class. …"
  9. 209

    Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey حسب Faria Nawshin (21841598)

    منشور في 2024
    "…As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. …"
  10. 210

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group حسب Iqtadar Hussain (14147850)

    منشور في 2023
    "…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …"
  11. 211

    Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images حسب Ahila A (18394806)

    منشور في 2022
    "…Over the decade, numerous artificial neural network (ANN)-based techniques were adopted in order to diagnose and classify breast cancer due to the unique characteristics of learning key features from complex data via a training process. However, these schemes have limitations like slow convergence and longer training time. …"
  12. 212
  13. 213

    Sample intelligence-based progressive hedging algorithms for the stochastic capacitated reliable facility location problem حسب Nezir Aydin (8355378)

    منشور في 2024
    "…Further, the developed methods are practical in that they allow the specialist to adjust the tradeoff between the exactness and speed of attaining a solution. …"
  14. 214

    Real-Time Selective Harmonic Mitigation Technique for Power Converters Based on the Exchange Market Algorithm حسب Abraham Marquez Alcaide (18582451)

    منشور في 2020
    "…<p dir="ltr">Hand-in-hand with the smart-grid paradigm development, power converters used in high-power applications are facing important challenges related to efficiency and power quality. …"
  15. 215

    Optimization of Piezoelectric Sensor-Actuator for Plate Vibration Control Using Evolutionary Computation: Modeling, Simulation and Experimentation حسب Asan G. A. Muthalif (16888818)

    منشور في 2021
    "…<p dir="ltr">The development of lightweight, stronger, and more flexible structures has received the utmost interest from many researchers. …"
  16. 216
  17. 217

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare حسب Haraty, Ramzi A.

    منشور في 2007
    "…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 218

    Nonlinear Control of Brushless Dual-Fed Induction Generator With a Flywheel Energy Storage System for Improved System Performance حسب Mohammed Hamidat (3722086)

    منشور في 2025
    "…This study focuses on developing an advanced control strategy for a Brushless Dual-Fed Induction Generator (BDFIG) integrated with a Nonlinear Energy Storage System. …"
  19. 219

    EEG Signal Processing for Medical Diagnosis, Healthcare, and Monitoring: A Comprehensive Review حسب Nisreen Said Amer (17984077)

    منشور في 2023
    "…The study of reliable feature extraction and classification algorithms is crucial for a more accurate analysis of EEG signals. …"
  20. 220

    Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights حسب Malekloo, Arman

    منشور في 2021
    "…Connecting the ubiquitous sensing and big data processing of critical information in infrastructures through the IoT paradigm is the future of SHM systems. …"
    احصل على النص الكامل
    article