بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
data tracking » radar tracking (توسيع البحث)
element » elements (توسيع البحث)
يعرض 341 - 360 نتائج من 526 نتيجة بحث عن '(( element method algorithm ) OR ((( data based algorithm ) OR ( data tracking algorithm ))))', وقت الاستعلام: 0.10s تنقيح النتائج
  1. 341

    An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System حسب Alkhatib, Osama

    منشور في 2019
    "…Therefore, for this paper multiple machine learning algorithms are investigated to predict system failure based on vehicle trips information as well as maintenance management historical data including preventive maintenance and corrective maintenance. …"
    احصل على النص الكامل
  2. 342
  3. 343

    RFID localization using single reader antenna. (c2014) حسب Msheik, Hamze

    منشور في 2016
    "…In this work we propose a novel RFID based Localization methodology. Our scheme is based on Power Map Matching algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  4. 344

    Corona power loss computation in bundled bipolar conductors حسب Al-Hamouz, Z.M.

    منشور في 2000
    "…In this paper, a finite element (FE) based algorithm devoted for the computation of the corona current and hence the corona power loss associated with bundled bipolar high voltage direct current (HVDC) conductors is presented. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 345

    Newton-Raphson based adaptive inverse control scheme for tracking of nonlinear dynamic plants حسب Shafiq, M.

    منشور في 2006
    "…The U-model is utilized to design an adaptive inverse controller by using a simple root-solving algorithm of Newton-Raphson. The synergy of U-model with AIC structure has provided an effective and straight forward method for adaptive tracking of nonlinear plants. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 346

    Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles حسب Warren, Thomas

    منشور في 2000
    "…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 347
  8. 348

    Vibration suppression in a cantilever beam using a string-type vibration absorber حسب Issa, Jimmy S.

    منشور في 2017
    "…The string is rigidly connected to the fixed end of the beam and through a spring and damper to a second point on the beam. The finite element method is used to model the system and a reduced order model is obtained through modal reduction performed on both the string and the beam. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  9. 349

    Scatter search for homology modeling حسب Mansour, Nashat

    منشور في 2016
    "…However this technique suffers from poor initial target-template alignments. To improve homology based PSP, we propose a scatter search (SS) metaheuristic algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  10. 350

    MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks حسب Artail, Hassan

    منشور في 2009
    "…This paper introduces a message forwarding algorithm for search applications within mobile ad hoc networks that is based on the concept of selecting the nearest node from a set of designated nodes. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 351

    Information warfare حسب Haraty, Ramzi A.

    منشور في 2017
    "…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 352

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura, Habiba

    منشور في 2023
    "…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 353

    Shuffled Linear Regression with Erroneous Observations حسب Saab, Samer S.

    منشور في 2019
    "…We propose an optimal recursive algorithm that updates the estimate from the underdetermined function that is based on that permutation-invariant constraint. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  14. 354
  15. 355
  16. 356

    Information Warfare حسب Haraty, Ramzi A.

    منشور في 2015
    "…The algorithm is based on data dependency and uses a single matrix that will be later used during recovery.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  17. 357

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates حسب Ratiba F. Ghachi (14152455)

    منشور في 2022
    "…The thin plate and the zigzag cutouts are modelled using the finite element method, and the optimal location and optimal tip mass of the zigzag cutouts are obtained using genetic algorithms through iterative simulations. …"
  18. 358

    A forward-backward Kalman for the estimation of time-variant channels in OFDM حسب Al-Naffouri, T.Y.

    منشور في 2005
    "…In this paper, we propose an expectation-maximization (EM) algorithm for joint channel and data recovery. The algorithm makes use of the rich structure of the underlying communication problem-a structure induced by the data and channel constraints. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 359

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura Habiba (17808302)

    منشور في 2023
    "…This paper proposes a deep learning-based algorithm to protect the network against Distributed Denial-of-Service (DDoS) attacks, insecure data flow, and similar network intrusions. …"
  20. 360

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology حسب Al-Hemairy, Moh'd Hussain

    منشور في 2010
    "…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
    احصل على النص الكامل