Showing 221 - 240 results of 338 for search '(( element rd algorithm ) OR ((( data code algorithm ) OR ( based control algorithm ))))', query time: 0.14s Refine Results
  1. 221

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…Every communication body wants to secure their data while communicating over the Internet. The internet has various benefits but the main demerit is the privacy and security and the transmission of data over insecure network or channel may happen. …”
  2. 222
  3. 223

    ARDENT: A Proactive Agent-Based Routing Protocol for Internet of Vehicles by Mazouzi, Mohamed

    Published 2023
    “…The design of an efficient routing algorithm for the Internet of Vehicles (IoV) poses several problems due to its special characteristics, including nodes high-speed mobility, frequent topology change, link instability, and the presence of radio obstacles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  4. 224
  5. 225
  6. 226

    Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies by Jebbaoui, Hussein

    Published 2015
    “…XACML (eXtensible Access Control Markup Language) policies, which are widely adopted for defining and controlling dynamic access among Web/cloud services, are becoming more complex in order to handle the significant growth in communication and cooperation between individuals and composed services. …”
    Get full text
    Get full text
    Get full text
    article
  7. 227
  8. 228
  9. 229

    Developing a resilient framework for electric vehicle charging stations harnessing solar energy, standby batteries and grid integration with advanced control mechanisms by Debabrata Mazumdar (18560506)

    Published 2024
    “…Consequently, this article presents and evaluates a system that utilizes a proportional‐integral‐derivative controller, a neural network‐equipped grid and a charging station utilizing a Dragon Fly Optimization Algorithm to generate power and a maximum power point tracking controller. …”
  10. 230

    Analysis of power system stability enhancement via excitation and FACTS-based stabilizers by Abido, M. A.

    Published 2004
    “…Then, a real-coded genetic algorithm is employed to search for optimal controller parameters. …”
    Get full text
    article
  11. 231

    Analysis and Assessment of STATCOM-Based Damping Stabilizers for Power System Stability Enhancement by Abido, M. A.

    Published 2005
    “…This study presents a singular value decomposition (SVD)-based approach to assess and measure the controllability of the poorly damped electromechanical modes by STATCOM different control channels. …”
    Get full text
    article
  12. 232
  13. 233

    Stability improvement of the PSS-connected power system network with ensemble machine learning tool by M.S. Shahriar (19517536)

    Published 2022
    “…The first system is a single-machine infinite bus power system, while the second is a unified power flow controller (UPFC) device. The backtracking search algorithm (BSA) based proposed ensemble model is formed by combining three machine learning (ML) techniques, namely the extreme learning machine (ELM), neurogenetic (NG) system, and multi-gene genetic programming (MGGP). …”
  14. 234
  15. 235

    Minimizing using BBO and DFO methods by El Zeghondy, Jean

    Published 2022
    “…In [1], Nour and Zeidan proposed a numerical algorithm to solve optimal control problems involving sweeping processes. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  16. 236

    A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis by Alaa Abd-Alrazaq (17430900)

    Published 2021
    “…Specifically, we used a clustering algorithm to group published articles based on the similarity of their abstracts to identify research hotspots and current research directions. …”
  17. 237
  18. 238

    Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone by Saeed Ullah Jan (9079260)

    Published 2021
    “…This technology can be controlled remotely by an invisible yet credible operator sitting to a powerful intelligence computer system (PICS) or an airborne control and command platform (AC2P). …”
  19. 239

    Blood-Based Proteomic Profiling Identifies Potential Biomarker Candidates and Pathogenic Pathways in Dementia by Hanan Ehtewish (17149825)

    Published 2023
    “…We used a high-throughput proximity extension immunoassay to quantify 1090 proteins in 122 participants (22 with dementia, 64 with mild cognitive impairment (MCI), and 36 controls with normal cognitive function). Limma-based differential expression analysis reported the dysregulation of 61 proteins in the plasma of those with dementia compared with controls, and machine learning algorithms identified 17 stable diagnostic biomarkers that differentiated individuals with AUC = 0.98 ± 0.02. …”
  20. 240

    "Particle Swarm Based Design of Variable Structure Stabilizer for a Nonlinear Model of SMIB System" by Al-Hamouz, Z.

    Published 2006
    “…Unlike the methods reported in the literature which involve either linearizing the model of synchronous machine around a suitable operation point or applying nonlinear transformation techniques before linear control theory is used in designing a fixed parameter PSS, the present method formulates the design of VSC as an optimization problem and utilized the PSO algorithm to provide a simple and systematic way of arriving at the optimal feedback gains and switching vector values of the stabilizer. …”
    Get full text
    article