Search alternatives:
processing algorithm » processing algorithms (Expand Search)
robust algorithm » mould algorithm (Expand Search)
maya algorithm » jaya algorithm (Expand Search)
Showing 301 - 320 results of 356 for search '(( data processing algorithm ) OR ((( develop robust algorithm ) OR ( elements maya algorithm ))))', query time: 0.11s Refine Results
  1. 301

    Particle swarm optimization for multimachine power systemstabilizer design by Abido, A.A.

    Published 2001
    “…In this paper, a novel evolutionary algorithm based approach to optimal design of multimachine power system stabilizers (PSSs) is proposed. …”
    Get full text
    Get full text
    article
  2. 302

    A fuzzy basis function network for generator excitation control by Abido, M.A.

    Published 1997
    “…The orthogonal least squares learning algorithm is developed for designing an adequate and parsimonious FBFN model. …”
    Get full text
    Get full text
    article
  3. 303

    Intelligent route to design efficient CO<sub>2</sub> reduction electrocatalysts using ANFIS optimized by GA and PSO by Majedeh Gheytanzadeh (17541927)

    Published 2022
    “…Accordingly, a dataset containg 258 data points was extracted from the DFT method to use in machine learning method. …”
  4. 304
  5. 305

    A Comprehensive Review of AI’s Current Impact and Future Prospects in Cybersecurity by Abdullah Al Siam (22304047)

    Published 2025
    “…We examine cutting-edge AI methodologies and principal models across many domains, including machine learning algorithms, deep learning architectures, natural language processing techniques, and anomaly detection algorithms, emphasizing their distinct contributions to enhancing security. …”
  6. 306

    Analysis of power system stability enhancement via excitation and FACTS-based stabilizers by Abido, M. A.

    Published 2004
    “…An eigenvalue-based objective function to increase the system damping and improve the system response is developed. Then, a real-coded genetic algorithm is employed to search for optimal controller parameters. …”
    Get full text
    article
  7. 307

    CEAP by Abdel Wahab, Omar

    Published 2016
    “…The first challenge is related to the highly mobile nature of vehicles that complicates the processes of monitoring, buffering, and analyzing observations on these vehicles as they are continuously moving and changing their locations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  8. 308

    Empowering IoT Resilience: Hybrid Deep Learning Techniques for Enhanced Security by Muhammad Maaz (5600600)

    Published 2024
    “…The aim is to demonstrate the robustness of the proposed algorithms in effectively identifying telnet, password, distributed denial of service (DDoS), injection, and backdoor vulnerabilities in IoT ecosystems. …”
  9. 309

    Thermodynamic Analysis and Optimization of Densely-Packed Receiver Assembly Components in High-Concentration CPVT Solar Collectors by Sharaf, Omar Z.

    Published 2016
    “…Thermodynamic component-level analyses that avoid oversimplified as well as computationally-expensive modeling approaches and provide clear and robust simulation algorithms with reasonable accuracy are separately developed for the three addressed components. …”
    Get full text
    article
  10. 310

    Global smart cities classification using a machine learning approach to evaluating livability, technology, and sustainability performance across key urban indices by Aya Hasan Alkhereibi (17151070)

    Published 2025
    “…This approach is necessary for understanding and replicating best practices in urban management and smart city development. Focusing on high-ranking cities ensures the study analyzes robust and reliable data, avoiding noise and inconsistencies arising from lower-performing or less-documented cases. …”
  11. 311

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone by Saeed Ullah Jan (9079260)

    Published 2021
    “…This issue of security risk can be minimized conspicuously by developing a robust authentication scheme for IoD deployment military drones. …”
  12. 312

    Towards secure and trusted AI in healthcare: A systematic review of emerging innovations and ethical challenges by Muhammad Mohsin Khan (22303366)

    Published 2025
    “…Still, challenges in adversarial attacks, algorithmic bias, and variable regulatory frameworks remain strong. …”
  13. 313
  14. 314

    AI-Based Methods for Predicting Required Insulin Doses for Diabetic Patients by Azar, Danielle

    Published 2015
    “…The performance of the three algorithms is evaluated on a data set found in the public UCMI repository.…”
    Get full text
    Get full text
    article
  15. 315

    A lightweight adaptive compression scheme for energy-efficient mobile-to-mobile file sharing applications by Sharafeddine, Sanaa

    Published 2011
    “…The proposed scheme monitors the signal strength level during the file transfer process and compresses data blocks on-the-fly only whenever energy reduction gain is expected. …”
    Get full text
    Get full text
    Get full text
    article
  16. 316

    Barriers of Adopting Artificial Intelligence Tools in Engineering Construction Projects by ALKAABI, ABDULLA

    Published 2023
    “…The situation may cause concern and trepidation about integrating AI technologies and lack understanding of their optimal deployment and operation. Construction data management and integration are difficult. AI algorithms depend on data for training and analysis. …”
    Get full text
  17. 317
  18. 318

    Dynamic single node failure recovery in distributed storage systems by Itani, M.

    Published 2017
    “…We selected fractional repetition coding due to its simple repair mechanism that minimizes the repair and disk access bandwidths together with the property of un-coded repair process. To minimize the system repair cost, we formulate our problem using incidence matrices and solve it heuristically using genetic algorithms for all possible cases of single node failures. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  19. 319

    ISSP by Zouein, P.P.

    Published 2017
    “…Many decision-support tools were developed to assist planners in space scheduling but these were limited to providing the user with a platform that ties spatial and temporal data in the project and left it up to the user to decide on positions of resources and schedule adjustments to solve spatial conflicts that may arise in the process of constructing site layouts over time.The ISSP system, presented here, provides a graphical user-interactive interface with underlying layout and scheduling algorithms that construct feasible layout and schedule solutions under 2-dimensional spatial constraints between resources. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  20. 320

    The use of semantic-based predicates implication to improve horizontal multimedia database fragmentation by Getahun, Fekade

    Published 2007
    “…We particularly discuss multimedia primary horizontal fragmentation and focus on semantic-based textual predicates implication required as a pre-process in current fragmentation algorithms in order to partition multimedia data efficiently. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject