بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
ipca algorithm » jaya algorithm (توسيع البحث)
يعرض 181 - 200 نتائج من 599 نتيجة بحث عن '(( data processing algorithm ) OR ((( develop based algorithms ) OR ( elements ipca algorithm ))))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 181
  2. 182

    KNNOR: An oversampling technique for imbalanced datasets حسب Ashhadul Islam (16869981)

    منشور في 2021
    "…The proposed technique called K-Nearest Neighbor OveRsampling approach (KNNOR) performs a three step process to identify the critical and safe areas for augmentation and generate synthetic data points of the minority class. …"
  3. 183
  4. 184

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group حسب Iqtadar Hussain (14147850)

    منشور في 2023
    "…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …"
  5. 185

    Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images حسب Ahila A (18394806)

    منشور في 2022
    "…Over the decade, numerous artificial neural network (ANN)-based techniques were adopted in order to diagnose and classify breast cancer due to the unique characteristics of learning key features from complex data via a training process. However, these schemes have limitations like slow convergence and longer training time. …"
  6. 186

    Variable Selection in Data Analysis: A Synthetic Data Toolkit حسب Mitra, Rohan

    منشور في 2024
    "…Lastly, we provide public access to the generated datasets to facilitate bench-marking of new feature selection algorithms in the field via our Github repository. The contributions of this paper aim to foster the development of novel feature selection algorithms and advance their study.…"
    احصل على النص الكامل
    article
  7. 187
  8. 188

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare حسب Haraty, Ramzi A.

    منشور في 2007
    "…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 189
  10. 190
  11. 191

    PILE-UP FREE PARAMETER ESTIMATION AND DIGITAL ONLINE PEAK LOCALIZATION ALGORITHMS FOR GAMMA RAY SPECTROSCOPY حسب Noras, J.M.

    منشور في 2020
    "…A number of parameter estimation and digital online peak localisation algorithms are being developed, including a pulse classification technique which uses a simple peak search routine based on the smoothed first derivative method, which gave a percentage error of peak amplitude of less than 0.1. …"
    احصل على النص الكامل
    article
  12. 192
  13. 193

    Machine learning and structural health monitoring overview with emerging technology and high-dimensional data source highlights حسب Malekloo, Arman

    منشور في 2021
    "…Connecting the ubiquitous sensing and big data processing of critical information in infrastructures through the IoT paradigm is the future of SHM systems. …"
    احصل على النص الكامل
    article
  14. 194
  15. 195

    Application of updated joint detection algorithm for the analysis of drilling parameters of roof bolters in multiple joints conditions حسب Liu, Wenpeng

    منشور في 2017
    "…For this purpose, computer programs based on updated pattern recognition algorithms were developed for joint-detection and classification of rock types to offer an estimated strength. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  16. 196
  17. 197

    Experimental Investigation and Comparative Evaluation of Standard Level Shifted Multi-Carrier Modulation Schemes With a Constraint GA Based SHE Techniques for a Seven-Level PUC Inv... حسب Atif Iqbal (5504636)

    منشور في 2019
    "…Different standard multicarrier sinusoidal pulse-width modulation techniques (SPWMs) are adapted for the generation of switching gate signals for the PUC power switches, and these SPWMs are compared with novel optimization-based selective harmonic elimination (SHE) that employs genetic algorithm (GA) for solving nonlinear SHE equation with a constraint that eliminated all third-order harmonics efficiently. …"
  18. 198

    Optimization of PV Cleaning Practices: Comparison Between Performance-Based and Periodic-Based Approaches حسب Abdulla Alhajeri, Rashed

    منشور في 2020
    "…It is important to choose the right cleaning strategy (method and frequency) to maximize the electricity production and economic performance of the PV facility. An optimization algorithm was developed and tested for multiple PV panel configurations based in Dubai Water and Electricity Authority’s (DEWA) outdoor test facil ity (OTF) solar lab. …"
    احصل على النص الكامل
    احصل على النص الكامل
  19. 199

    Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators حسب Abu Zitar, Raed

    منشور في 2021
    "…The outcomes of the DNA microarray is a table/matrix, called gene expression data. Pattern recognition algorithms are widely applied to gene expression data to differentiate between health and cancerous patient samples. …"
    احصل على النص الكامل
  20. 200