بدائل البحث:
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
developing ii » developing a (توسيع البحث), developing _ (توسيع البحث)
ii algorithm » rd algorithm (توسيع البحث), _ algorithms (توسيع البحث)
element » elements (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
developing ii » developing a (توسيع البحث), developing _ (توسيع البحث)
ii algorithm » rd algorithm (توسيع البحث), _ algorithms (توسيع البحث)
element » elements (توسيع البحث)
-
661
Autonomous Demand-Side Management in the Future Smart Grid
منشور في 2016احصل على النص الكامل
doctoralThesis -
662
Turbo-charging dominating set with an FPT subroutine
منشور في 2017احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
663
Anonymizing multimedia documents
منشور في 2016"…In this paper, we propose de-linkability, a privacy-preserving constraint to bound the amount of information outsourced that can be used to re-identify individuals. We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
664
Reconfigured Photovoltaic Model to Facilitate Maximum Power Point Tracking for Micro and Nano-Grid Systems
منشور في 2022"…The I–V characteristics of conventional and reconfigured models are programmed into the simulator and the use of the hill climbing algorithm is validated. To analyze the voltage and power oscillations with MPP tracking, the PSO algorithm is also tested for two test patterns and its results are comprehensively studied.…"
-
665
-
666
An Infrastructure-Assisted Crowdsensing Approach for On-Demand Traffic Condition Estimation
منشور في 2019"…However, the current solutions proposed for the use of crowdsensing for the collection of traffic related data adopt an opportunistic continuous sensing approach, which entails high resource consumption on the server and mobile device side, a high communication overhead, while offering little control of the users over the sensing activity. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
667
Validation of plasma protein glycation and oxidation biomarkers for the diagnosis of autism
منشور في 2023"…Three hundred and eleven children with ASD (247 male, 64 female; age 5.2 ± 3.0 years) and 167 children with typical development (94 male, 73 female; 4.9 ± 2.4 years) were recruited for this study at Sidra Medicine and Hamad Medical Corporation hospitals, Qatar, and Hospital Regional Universitario de Málaga, Spain. …"
-
668
Active distribution network type identification method of high proportion new energy power system based on source-load matching
منشور في 2023"…Firstly, the typical daily output scenarios of DG are extracted by clustering method, and the generalized load curve model is solved by the optimization algorithm to obtain the source load operation data; Secondly, calculate the source-load matching indicators (including matching performance, matching degree, and matching rate) according to the source load data of each region, and identify the distribution network type according to the range of the index values; Finally, several indicators are introduced to quantify the characteristics of different types of distribution networks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
669
ARDENT: A Proactive Agent-Based Routing Protocol for Internet of Vehicles
منشور في 2023"…The design of an efficient routing algorithm for the Internet of Vehicles (IoV) poses several problems due to its special characteristics, including nodes high-speed mobility, frequent topology change, link instability, and the presence of radio obstacles. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
670
-
671
Impacts of On-Grid Solar PV on Distribution Networks and Potential Solutions: A Case Study in the Region of Zahle
منشور في 2025"…The siting and sizing methodology is conducted by considering five different optimization algorithms, namely the single-objective genetic algorithm (SOGA), the combined SOGA and loss sensitivity factor algorithm (SOGA-LSF), the multi-objective genetic algorithm (MOGA), the combined MOGA-LSF and the CAPADD algorithm of OpenDSS. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
672
-
673
Comparative Study of Control Strategies for Under Actuated Manipulator
منشور في 2006احصل على النص الكامل
doctoralThesis -
674
Adaptive Video Streaming Over Cognitive Radio Networks
منشور في 2017احصل على النص الكامل
doctoralThesis -
675
Optimal shunt compensators at nonsinusoidal busbars
منشور في 1995"…The model for the nonlinear load is a two variable problem in L (inductor) and C (capacitor). …"
احصل على النص الكامل
احصل على النص الكامل
article -
676
Estimation of power grid topology parameters through pilot signals
منشور في 2016احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
677
Implementation of trust region methods in optimization. (c1998)
منشور في 1998احصل على النص الكامل
احصل على النص الكامل
masterThesis -
678
An efficient claim management assurance system using EPC contract based on improved monarch butterfly optimization models
منشور في 2024"…To address these challenges, a claim management system is developed based on the Improved Monarch Butterfly Optimization Algorithm (IMBOA) and the principles of EPC. …"
-
679
Deepfakes Signatures Detection in the Handcrafted Features Space
منشور في 2023"…In the Handwritten Signature Verification (HSV) literature, several synthetic databases have been developed for data-augmentation purposes, where new specimens and new identities were generated using bio-inspired algorithms, neuromotor synthesizers, Generative Adversarial Networks (GANs) as well as several deep learning methods. …"
احصل على النص الكامل
-
680
A Software detector of the Wolff-Parkinson-White (WPW) Syndrome
منشور في 2000"…This paper presents a software package that has been developed to help physicians in detecting the existence of the Wolff-Parkinson-White (WPW) syndrome in a patient and the location of the accessory pathway in the human heart using D'Avilla's and Iturralde's algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article