Search alternatives:
processing algorithm » processing algorithms (Expand Search)
per algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
based control » case control (Expand Search)
elementi » elements (Expand Search), element (Expand Search), elemental (Expand Search)
processing algorithm » processing algorithms (Expand Search)
per algorithm » deer algorithm (Expand Search), rd algorithm (Expand Search), search algorithm (Expand Search)
based control » case control (Expand Search)
elementi » elements (Expand Search), element (Expand Search), elemental (Expand Search)
-
341
Developing a resilient framework for electric vehicle charging stations harnessing solar energy, standby batteries and grid integration with advanced control mechanisms
Published 2024“…Consequently, this article presents and evaluates a system that utilizes a proportional‐integral‐derivative controller, a neural network‐equipped grid and a charging station utilizing a Dragon Fly Optimization Algorithm to generate power and a maximum power point tracking controller. …”
-
342
Information warfare recovery-fighting back through the matrix. (c2012)
Published 2012Get full text
Get full text
masterThesis -
343
Analysis of power system stability enhancement via excitation and FACTS-based stabilizers
Published 2004“…Then, a real-coded genetic algorithm is employed to search for optimal controller parameters. …”
Get full text
article -
344
-
345
Analysis and Assessment of STATCOM-Based Damping Stabilizers for Power System Stability Enhancement
Published 2005“…This study presents a singular value decomposition (SVD)-based approach to assess and measure the controllability of the poorly damped electromechanical modes by STATCOM different control channels. …”
Get full text
article -
346
C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments
Published 2023“…The aim of streaming conformance checking is to find dis crepancies between process executions on streaming data and the refer ence process model. …”
Get full text
Get full text
Get full text
-
347
-
348
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
Published 2020“…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …”
-
349
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
Published 2023“…<p dir="ltr">The process of using robotic technology to examine underwater systems is still a difficult undertaking because the majority of automated activities lack network connectivity. …”
-
350
Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las...
Published 2020“…In view of this, an innovative signal processing technique called a self-adaptive-smart algorithm (SASA) was designed and developed. …”
Get full text
-
351
Stability improvement of the PSS-connected power system network with ensemble machine learning tool
Published 2022“…The first system is a single-machine infinite bus power system, while the second is a unified power flow controller (UPFC) device. The backtracking search algorithm (BSA) based proposed ensemble model is formed by combining three machine learning (ML) techniques, namely the extreme learning machine (ELM), neurogenetic (NG) system, and multi-gene genetic programming (MGGP). …”
-
352
Efficiency Optimization of a Standalone Solar Energy System using Fuzzy Based MPPT
Published 2012Get full text
doctoralThesis -
353
Minimizing using BBO and DFO methods
Published 2022“…In [1], Nour and Zeidan proposed a numerical algorithm to solve optimal control problems involving sweeping processes. …”
Get full text
Get full text
Get full text
masterThesis -
354
A Comprehensive Overview of the COVID-19 Literature: Machine Learning–Based Bibliometric Analysis
Published 2021“…Specifically, we used a clustering algorithm to group published articles based on the similarity of their abstracts to identify research hotspots and current research directions. …”
-
355
Defining quantitative rules for identifying influential researchers: Insights from mathematics domain
Published 2024“…Within each categorical grouping, we meticulously selected the five most pivotal parameters. This selection process was guided by an importance score, that was derived after assessing its influence on the model's performance in the classification of data pertaining to both awardees and non awardees. …”
-
356
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
Published 2021“…This technology can be controlled remotely by an invisible yet credible operator sitting to a powerful intelligence computer system (PICS) or an airborne control and command platform (AC2P). …”
-
357
-
358
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
Published 2024“…<p dir="ltr">Most companies nowadays are using digital platforms for the recruitment of new employees to make the hiring process easier. The rapid increase in the use of online platforms for job posting has resulted in fraudulent advertising. …”
-
359
-
360
Blood-Based Proteomic Profiling Identifies Potential Biomarker Candidates and Pathogenic Pathways in Dementia
Published 2023“…We used a high-throughput proximity extension immunoassay to quantify 1090 proteins in 122 participants (22 with dementia, 64 with mild cognitive impairment (MCI), and 36 controls with normal cognitive function). Limma-based differential expression analysis reported the dysregulation of 61 proteins in the plasma of those with dementia compared with controls, and machine learning algorithms identified 17 stable diagnostic biomarkers that differentiated individuals with AUC = 0.98 ± 0.02. …”