بدائل البحث:
making algorithm » cosine algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
data making » data mining (توسيع البحث)
يعرض 261 - 280 نتائج من 395 نتيجة بحث عن '(( elements detection algorithm ) OR ((( data making algorithm ) OR ( solved using algorithm ))))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 261
  2. 262

    Active distribution network type identification method of high proportion new energy power system based on source-load matching حسب Qinlin, Shi

    منشور في 2023
    "…Firstly, the typical daily output scenarios of DG are extracted by clustering method, and the generalized load curve model is solved by the optimization algorithm to obtain the source load operation data; Secondly, calculate the source-load matching indicators (including matching performance, matching degree, and matching rate) according to the source load data of each region, and identify the distribution network type according to the range of the index values; Finally, several indicators are introduced to quantify the characteristics of different types of distribution networks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 263

    Multi-Objective Optimization for Food Availability under Economic and Environmental Risk Constraints حسب Bashar Hassna (19170940)

    منشور في 2024
    "…Utilizing these assessments, a multi-objective optimization model is developed and solved using MATLAB (R2018a)’s Genetic Algorithm, aiming to identify optimal suppliers to meet Qatar’s food demand, with consideration of the economic, environmental, and risk factors. …"
  4. 264

    An EM-Based Forward-Backward Kalman Filter for the Estimation of Time-Variant Channels in OFDM حسب Al-Naffouri, T.Y.

    منشور في 0000
    "…The algorithm makes a collective use of the data and channel constraints inherent in the communication problem. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 265

    An Ontology-based Semantic Web for Arabic Question Answering: The Case of E-Government Services حسب ALBARGHOTHI, ALI BAHA’EDDIN

    منشور في 2018
    "…Further, 414 automatic questions are tested on the QA algorithm using two methods, semantics-based and keyword-based. …"
    احصل على النص الكامل
  6. 266

    A Biologicaly Inspired Decision Model for Multivariable Genetic- Fuzzy-AHP System حسب Kouatli, Issam

    منشور في 2016
    "…The proposed GFT mechanism can be applied to any decision making problem within an uncertain environment. One example would be the determination of CRM performance measurement given a variety of inputs related to marketing, data mining tools, ordered materials and communication.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 267

    An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation حسب El-Maleh, Aiman H.

    منشور في 2001
    "…A common search optimization in sequential ATPG is to justify a desired state assignment on the sequential elements. State justification using deterministic algorithms is a difficult problem and is prone to many backtracks, which can lead to high execution times. …"
    احصل على النص الكامل
    article
  8. 268

    An evolutionary meta-heuristic for state justification insequential automatic test pattern generation حسب El-Maleh, A.H.

    منشور في 2001
    "…A common search operation in sequential ATPG is to justify a desired state assignment on the sequential elements. State justification using deterministic algorithms is a difficult problem and is prone to many backtracks, which can lead to high execution times. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 269
  10. 270
  11. 271

    Future Prediction of COVID-19 Vaccine Trends Using a Voting Classifier حسب Syed Ali Jafar Zaidi (19563178)

    منشور في 2021
    "…Multiple ML algorithms are used to improve decision-making at different aspects after forecasting. …"
  12. 272
  13. 273
  14. 274

    Joint Planning of Smart EV Charging Stations and DGs in Eco-Friendly Remote Hybrid Microgrids حسب Shaaban, Mostafa

    منشور في 2019
    "…An outer sub-problem determines the locations and sizes of the DG units and charging stations using a non-dominated sorting Genetic algorithm (NSGA-II). …"
    احصل على النص الكامل
    article
  15. 275

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura, Habiba

    منشور في 2023
    "…The Internet of Things (IoT) platform allows physical devices to connect directly to the internet and upload data continuously. Insecure access makes IoT platforms vulnerable to different network intrusion attacks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 276

    High-order parametrization of the hypergeometric-Meijer approximants حسب Abouzeid M. Shalaby (16329062)

    منشور في 2023
    "…To solve this problem, we formulate an equivalent (order by order) linear set of equations which is easy to solve in an appropriate time using normal PCs. …"
  17. 277

    Logic-based Benders decomposition combined with column generation for mobile 3D printer scheduling problem حسب Tao Li (86810)

    منشور في 2025
    "…After analyzing the characteristics and structure of the model, a logic-based Benders decomposition algorithm framework is designed for solving this problem. …"
  18. 278

    Meta Reinforcement Learning for UAV-Assisted Energy Harvesting IoT Devices in Disaster-Affected Areas حسب Marwan Dhuheir (19170898)

    منشور في 2024
    "…We conducted extensive simulations and compared our approach with two state-of-the-art models using traditional RL algorithms represented by a deep Q-network algorithm, a Particle Swarm Optimization (PSO) algorithm, and one greedy solution. …"
  19. 279
  20. 280

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura Habiba (17808302)

    منشور في 2023
    "…<p>The Internet of Things (IoT) platform allows physical devices to connect directly to the internet and upload data continuously. Insecure access makes IoT platforms vulnerable to different network intrusion attacks. …"