Search alternatives:
taking algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
levels using » cells using (Expand Search)
element » elements (Expand Search)
taking algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
levels using » cells using (Expand Search)
element » elements (Expand Search)
-
141
Improving Active Resonance Damping and Unbalanced Voltage Mitigation Based on Combined DDSRF and Washout Filter in Islanded Microgrids
Published 2024“…Finally, Level 4 integrates a controller based on extracting positive and negative sequence components using the dual decoupled synchronous reference frame (DDSRF) algorithm. …”
-
142
Collision-Free Autonomous Navigation Solution for Mobile Wheeled
Published 2023Get full text
doctoralThesis -
143
Regression Testing of Database Applications
Published 2002“…The Call Graph Firewall algorithm uses a firewall for the inter-procedural level. …”
Get full text
Get full text
Get full text
article -
144
Towards a Unified Arabic Government Services Chatbot Based on Ontology
Published 2020“…High Accuracy score has been achieved by the proposed algorithm that reached 96% with Recall of 100% and Precision of 96% as well. …”
Get full text
-
145
Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT)
Published 2015“…Decision making and/or Decision Support Systems (DSS) using intelligent techniques like Genetic Algorithm and fuzzy logic is becoming popular in many new applications. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
146
Edge Caching in Fog-Based Sensor Networks through Deep Learning-Associated Quantum Computing Framework
Published 2022“…Firstly, the DL agent prioritizes caching contents via self organizing maps (SOMs) algorithm, and secondly, the prioritized contents are stored in QMM using a Two-Level Spin Quantum Phenomenon (TLSQP). …”
-
147
Regression testing web services-based applications
Published 2006Get full text
Get full text
Get full text
Get full text
conferenceObject -
148
Performance Analysis of Artificial Neural Networks in Forecasting Financial Time Series
Published 2013Get full text
doctoralThesis -
149
-
150
Structural similarity evaluation between XML documents and DTDs
Published 2007“…The automatic processing and management of XML-based data are ever more popular research issues due to the increasing abundant use of XML, especially on the Web. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
151
Guidance, Control and Trajectory Tracking of Small Fixed Wing Unmanned Aerial Vehicles (UAV's)
Published 2009Get full text
doctoralThesis -
152
Uplink channel estimation for IMT-DS system
Published 2001“…The DRCE employs an adaptive filter whose weights are adapted by using an LMS algorithm. The performance of the RAKE receiver with DRCE for an IMT-DS system is evaluated in terms of BER by simulations for pedestrian and vehicular channels…”
Get full text
Get full text
article -
153
A survey and comparison of wormhole routing techniques in a meshnetworks
Published 1997“…These multiprocessing systems consist of processing elements or nodes which are connected together by interconnection networks in various topologies. …”
Get full text
Get full text
article -
154
Adaptive false discovery rate for wavelet denoising of pavement continuous deflection measurements
Published 2016“…The algorithm minimizes the classification error of features in the wavelet transform domain by adaptively selecting the level at which to control the false discovery rate. …”
Get full text
Get full text
Get full text
Get full text
article -
155
-
156
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
Published 2023“…Moreover, the Reconciliate Multi-Agent Markov Learning (RMML) based classification algorithm is used to predict the intrusion with its appropriate classes. …”
-
157
Genetic Fuzzimetric Technique (GFT)
Published 2012“…Integration of fuzzy systems with genetic algorithm has been identified by researchers as a useful technique of optimizing systems under uncertainty. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
158
-
159
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
Published 2021“…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …”
Get full text
-
160
A novel approach for real time flows scheduling
Published 2006“…A plethora of packet-scheduling algorithms have been proposed in the literature in order to meet the stringent time constraints of real time flows at an IP router level. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject