Showing 181 - 200 results of 1,010 for search '(( element mean algorithm ) OR ((( data using algorithm ) OR ( based methods algorithm ))))', query time: 0.13s Refine Results
  1. 181

    Active distribution network type identification method of high proportion new energy power system based on source-load matching by Qinlin, Shi

    Published 2023
    “…Here, we report an active distribution network type identification method based on source-load matching. Firstly, the typical daily output scenarios of DG are extracted by clustering method, and the generalized load curve model is solved by the optimization algorithm to obtain the source load operation data; Secondly, calculate the source-load matching indicators (including matching performance, matching degree, and matching rate) according to the source load data of each region, and identify the distribution network type according to the range of the index values; Finally, several indicators are introduced to quantify the characteristics of different types of distribution networks. …”
    Get full text
    Get full text
    Get full text
    article
  2. 182
  3. 183
  4. 184

    High-Accurate Parameter Identification of PEMFC Using Advanced Multi-Trial Vector-Based Sine Cosine Meta-Heuristic Algorithm by Badreddine Kanouni (23073244)

    Published 2025
    “…The trigonometric function-based sine cosine algorithm (SCA) may solve such problems, but it traps in local optima, making it inappropriate for larger optimization tasks. …”
  5. 185

    Extreme Early Image Recognition Using Event-Based Vision by Abubakar Abubakar (18278998)

    Published 2023
    “…<p dir="ltr">While deep learning algorithms have advanced to a great extent, they are all designed for frame-based imagers that capture images at a high frame rate, which leads to a high storage requirement, heavy computations, and very high power consumption. …”
  6. 186
  7. 187

    Improved prairie dog optimization algorithm by dwarf mongoose optimization algorithm for optimization problems by Abualigah, Laith

    Published 2023
    “…The proposed method is based on enhancing the search process of the Prairie Dog Optimization Algorithm (PDOA) by using the primary updating mechanism of the Dwarf Mongoose Optimization Algorithm (DMOA). …”
    Get full text
  8. 188
  9. 189
  10. 190

    Ensemble-Based Spam Detection in Smart Home IoT Devices Time Series Data Using Machine Learning Techniques by Ameema Zainab (16864263)

    Published 2020
    “…The obtained results illustrate the efficacy of the proposed algorithm to analyze the time series data from the IoT devices for spam detection.…”
  11. 191

    Novel RFID-Based Pose Estimation Using Single Stationary Antenna by Saab, Samer S.

    Published 2016
    “…Our scheme is based on power map matching algorithm that is capable in estimating the location and orientation of objects. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  12. 192
  13. 193
  14. 194

    Wavelet Analysis- Singular Value Decomposition Based Method for Precise Fault Localization in Power Distribution Networks Using k-NN Classifier by Abhishek Raj (7245425)

    Published 2025
    “…<p dir="ltr">This article presents a wavelet analysis-singular value decomposition (WA-SVD) based method for precise fault localization in recent power distribution networks using k-NN Classifier. …”
  15. 195
  16. 196

    BUC algorithm for iceberg cubes by Nasr, George E.

    Published 2003
    “…The Uniform distribution is used as a basis for comparison. Results show that when the cube is sparse there is a correlation between the data distribution and the running time of the algorithm. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  17. 197
  18. 198
  19. 199

    Use data Mining Techniques to Predict Users’ Engagement on the Social Network Posts in The Period Before, During and After Ramadan by AL RAWASHDEH, HANEEN MOHAMMAD

    Published 2017
    “…Different classification algorithms were applied to the dataset using the Rapidminer tool. …”
    Get full text
  20. 200

    The use of multi-task learning in cybersecurity applications: a systematic literature review by Shimaa Ibrahim (22155739)

    Published 2024
    “…Five critical applications, such as network intrusion detection and malware detection, were identified, and several tasks used in these applications were observed. Most of the studies used supervised learning algorithms, and there were very limited studies that focused on other types of machine learning. …”