يعرض 361 - 380 نتائج من 786 نتيجة بحث عن '(( element method algorithm ) OR ((( data using algorithm ) OR ( based making algorithm ))))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 361

    A new fuzzy logic controller based IPM synchronous motor drive حسب Abido, M.A.

    منشور في 2003
    "…The proposed FLC is designed to have less computational burden, which makes it suitable for online implementation. The FLC parameters are optimized by genetic algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 362
  3. 363

    ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks حسب Muhammad Asif Khan (7367468)

    منشور في 2022
    "…In this paper, we propose data-driven machine learning (ML) schemes to efficiently solve these problems in wireless LAN (WLAN) networks. …"
  4. 364
  5. 365

    Defining quantitative rules for identifying influential researchers: Insights from mathematics domain حسب Ghulam Mustafa (458105)

    منشور في 2024
    "…The rules were developed for each parameter category using the Decision Tree Algorithm, which achieved an average accuracy of 70 to 75 percent for identifying awardees in mathematics domains. …"
  6. 366

    Soft Sensor for NOx Emission using Dynamical Neural Network حسب Shakil, M.

    منشور في 2020
    "…Principal Component Analysis (PCA) is used to reduce number of input variables. Lag space for the model is found by using genetic algorithm to find the best time delayed model. …"
    احصل على النص الكامل
    article
  7. 367

    Scheduling and allocation in high-level synthesis using stochastic techniques حسب Sait, Sadiq M.

    منشور في 2020
    "…In this work, a unique approach to scheduling and allocation problem using the genetic algorithm (GA) is described. This approach is different from a previous attempt using GA (Wehn et al., IFIP Working Conference on Logic and Architecture Synthesis, Paris, 1990, pp. 47–56) in many respects. …"
    احصل على النص الكامل
    article
  8. 368

    Higher-order statistics (HOS)-based deconvolution for ultrasonic nondestructive evaluation (NDE) of materials حسب Ghouti, Lahouari

    منشور في 1997
    "…Performance evaluation of the proposed methods and comparisons with existing methods are made by means of Monte-Carlo simulations, experimental data and analysis. The first scheme makes use of the complex cepstrum of the third-order cumulants (complex bicepstrum) of the ultrasonic signals. …"
    احصل على النص الكامل
    masterThesis
  9. 369

    RFID localization using single reader antenna. (c2014) حسب Msheik, Hamze

    منشور في 2016
    "…Our scheme is based on Power Map Matching algorithm. The proposed method employs the use of a Single Stationary Reader Antenna and multitags placed on the asset. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  10. 370

    Student advising decision to predict student's future GPA based on Genetic Fuzzimetric Technique (GFT) حسب Kouatli, Issam

    منشور في 2015
    "…Decision making and/or Decision Support Systems (DSS) using intelligent techniques like Genetic Algorithm and fuzzy logic is becoming popular in many new applications. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  11. 371
  12. 372
  13. 373

    Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation حسب Hariprasath Manoharan (14157966)

    منشور في 2023
    "…<p dir="ltr">The process of using robotic technology to examine underwater systems is still a difficult undertaking because the majority of automated activities lack network connectivity. …"
  14. 374

    A 3-D vision-based man-machine interface for hand-controlled telerobot حسب Al-Mouhamed, M.A.

    منشور في 2005
    "…To determine the three-dimensional (3-D) position a tracking algorithm based on uncalibrated cameras with weak perspective projection model is used. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 375
  16. 376

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…For instance, when the line of sight is broken, communication is mainly carried out through satellite using GPS (Global Positioning System) signals. Both GPS and UAVN/FANET use open network channels for data broadcasting, which are exposed to several threats, thus making security risky and challenging. …"
  17. 377
  18. 378
  19. 379

    Enhancement of SAR Speckle Denoising Using the Improved Iterative Filter حسب Yahia, Mohamed

    منشور في 2020
    "…Simulated, airborne (ESAR, Oberpfaffenhofen Germany) and spaceborne (Sentinel 1, Palm Jumeirah Dubai UAE) SAR data were used to assess the filtering performances of the studied filters.…"
    احصل على النص الكامل
    article
  20. 380

    FPGA-Based Network Traffic Classification Using Machine Learning حسب Elnawawy, Mohammed

    منشور في 2020
    "…The proposed design achieves an average throughput of 163.24 Gbps, exceeding throughputs of reported hardware-based classifiers that use comparable approaches, which in turn ensures the continuity of realtime traffic classification at congested data centers.…"
    احصل على النص الكامل
    article