يعرض 181 - 200 نتائج من 315 نتيجة بحث عن '(( elements deer algorithm ) OR ((( data processing algorithm ) OR ( solved making algorithm ))))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 181

    Fast Transient Stability Assessment of Power Systems Using Optimized Temporal Convolutional Networks حسب Mohamed Massaoudi (16888710)

    منشور في 2024
    "…The proposed algorithm unlocks scalability and system adaptability to operational variability by adopting numeric imputation and missing-data-tolerant techniques. …"
  2. 182

    Multi-Agent Meta Reinforcement Learning for Reliable and Low-Latency Distributed Inference in Resource-Constrained UAV Swarms حسب Marwan Dhuheir (19170898)

    منشور في 2025
    "…A key requirement in these applications is minimizing the latency of data processing, particularly for time-sensitive tasks like image classification of IIoT device data. …"
  3. 183

    Short-Term Load Forecasting in Active Distribution Networks Using Forgetting Factor Adaptive Extended Kalman Filter حسب Mena S. ElMenshawy (17983807)

    منشور في 2023
    "…A few research studies focused on developing data filtering algorithm for the load forecasting process using approaches such as Kalman filter, which has good tracking capability in the presence of noise in the data collection process. …"
  4. 184
  5. 185
  6. 186

    Vehicular-OBUs-As-On-Demand-Fogs حسب Sami, Hani

    منشور في 2020
    "…An Evolutionary Memetic Algorithm is elaborated to solve our vehicular container placement problem. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 187

    Optimal shunt compensators at nonsinusoidal busbars حسب El-Amin, I.M.

    منشور في 1995
    "…The choice of the capacitor value is constrained by the values that may cause resonance. This model was solved employing the penalty function approach and the golden Section Search algorithm for solving the linear load case. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 188

    OPTIMAL SHUNT COMPENSATORS AT NON-SINUSOIDAL BUSBARS حسب El-Amin, I.M.

    منشور في 2020
    "…The choice of the capacitor value is constrained by the values that may cause resonance. This model was solved employing the penalty function approach and the golden Section Search algorithm for solving the linear load case. …"
    احصل على النص الكامل
    article
  9. 189
  10. 190
  11. 191
  12. 192

    Competitive learning/reflected residual vector quantization for coding angiogram images حسب Mourn, W.A.H.

    منشور في 2003
    "…Medical images need to be compressed for the purpose of storage/transmission of a large volume of medical data. Reflected residual vector quantization (RRVQ) has emerged recently as one of the computationally cheap compression algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  13. 193

    Localization of Damages in Plain And Riveted Aluminium Specimens using Lamb Waves حسب S. Andhale, Yogesh

    منشور في 2018
    "…The TOA data of the wave reflected from the damage is used in the two arrival time difference and astroid algorithms to locate the damage in an enclosed area. …"
    احصل على النص الكامل
  14. 194
  15. 195

    A survey and comparison of wormhole routing techniques in a meshnetworks حسب Al-Tawil, K.M.

    منشور في 1997
    "…They consist of many processing nodes that interact by sending messages (containing both data and synchronization information) over a communication link, between nodes. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 196
  17. 197
  18. 198
  19. 199

    A novel hybrid methodology for fault diagnosis of wind energy conversion systems حسب Khaled Dhibi (16891524)

    منشور في 2023
    "…Feature selection pre-processing is an important step to increase the accuracy of the classification algorithm and decrease the dimensionality of a dataset. …"
  20. 200

    From Collatz Conjecture to chaos and hash function حسب Masrat Rasool (17807813)

    منشور في 2023
    "…The Collatz Conjecture is a mystery that has stumped mathematicians for decades and still has not been solved. This paper aims to introduce a novel approach to addressing current security challenges by utilizing our generalized Collatz process to create a chaos-based hash function. …"