Search alternatives:
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
data tracking » radar tracking (Expand Search)
element » elements (Expand Search)
Showing 241 - 260 results of 404 for search '(( element method algorithm ) OR ((( data tracking algorithm ) OR ( designed using algorithm ))))', query time: 0.12s Refine Results
  1. 241
  2. 242

    Short-Term Load Forecasting in Active Distribution Networks Using Forgetting Factor Adaptive Extended Kalman Filter by Mena S. ElMenshawy (17983807)

    Published 2023
    “…A few research studies focused on developing data filtering algorithm for the load forecasting process using approaches such as Kalman filter, which has good tracking capability in the presence of noise in the data collection process. …”
  3. 243

    Newton-Raphson based adaptive inverse control scheme for tracking of nonlinear dynamic plants by Shafiq, M.

    Published 2006
    “…The U-model is utilized to design an adaptive inverse controller by using a simple root-solving algorithm of Newton-Raphson. …”
    Get full text
    Get full text
    article
  4. 244
  5. 245

    Online Control and Optimization of Directional Drilling by unknown

    Published 2020
    “…The objective function considered is to minimize the tracking error and drilling efforts. Detailed mathematical formulation and computer simulation were used for evaluation of the performance of the proposed techniques for both systems, based on real well data.…”
    Get full text
    masterThesis
  6. 246

    Corona power loss computation in bundled bipolar conductors by Al-Hamouz, Z.M.

    Published 2000
    “…In this paper, a finite element (FE) based algorithm devoted for the computation of the corona current and hence the corona power loss associated with bundled bipolar high voltage direct current (HVDC) conductors is presented. …”
    Get full text
    Get full text
    article
  7. 247

    An Adaptive Joint Sparsity Recovery for Compressive Sensing Based EEG System by Hamza Djelouat (14603379)

    Published 2017
    “…In addition, the paper exploits the joint sparsity of multichannel EEG using subspace pursuit (SP) algorithm as well as a designed sparsifying basis in order to improve the reconstruction quality. …”
  8. 248

    Compensation of axle-generator errors due to wheel slip and slide by Saab, Samer S.

    Published 2002
    “…Significant errors of train axle generators (tachometers) are due to wheel slip and slide. An algorithm is designed to compensate for these errors. …”
    Get full text
    Get full text
    Get full text
    article
  9. 249

    Energy-Aware QoS Uplink Scheduling for UGS Traffic Flows in WiMAX Networks by Noorani, Sanabel

    Published 2014
    “…We used Voice-over-IP (VoIP) traffic connection models for UGS traffic flows to simulate and validate algorithm. …”
    Get full text
    article
  10. 250
  11. 251

    A Multistage Passive Islanding Detection Method for Synchronous-Based Distributed Generation by Sawas, Abdullah M.

    Published 2021
    “…In this article, the proposed classifier is trained and tested using a database of feature vectors, obtained using PSCAD, which were designed to reflect a variety of commonly encountered events on an IEEE 34-bus distribution system. …”
    Get full text
    article
  12. 252

    ENUMERATIVE TECHNIQUES IN TOPOLOGICAL OPTIMIZATION OF COMPUTER NETWORKS SUBJECT TO FAULT TOLERANCE AND RELIABILITY by Abd-El-barr, Mostafa

    Published 2002
    “…Experimental results obtained from a set of randomly generated networks using the proposed algorithms are presented and compared to those obtained using the existing techniques [1], [2]. …”
    Get full text
    article
  13. 253
  14. 254

    Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles by Warren, Thomas

    Published 2000
    “…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …”
    Get full text
    Get full text
    Get full text
    article
  15. 255

    Tabu Search For A Class Of Single-Machine Scheduling Problems by Al-Turki, Umar

    Published 2020
    “…Problems from the literature are used to test the performance of the algorithm. This algorithm can be used for solving other problems such as minimizing completion time deviation from a common due date.…”
    Get full text
    article
  16. 256

    Logic-based Benders decomposition combined with column generation for mobile 3D printer scheduling problem by Tao Li (86810)

    Published 2025
    “…After analyzing the characteristics and structure of the model, a logic-based Benders decomposition algorithm framework is designed for solving this problem. …”
  17. 257

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura, Habiba

    Published 2023
    “…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
    Get full text
    Get full text
    Get full text
    article
  18. 258

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura Habiba (17808302)

    Published 2023
    “…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
  19. 259

    The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions by Abdulmalik Alwarafy (17984104)

    Published 2022
    “…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
  20. 260

    Information warfare. (c2015) by Sai, Mohamed El

    Published 2015
    “…Numerous damage assessment and recovery algorithms have been proposed by researchers. In this work we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …”
    Get full text
    Get full text
    masterThesis