Search alternatives:
method algorithm » mould algorithm (Expand Search)
making algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
Showing 201 - 220 results of 420 for search '(( elements method algorithm ) OR ((( based making algorithm ) OR ( solved using algorithm ))))', query time: 0.14s Refine Results
  1. 201

    Design Optimization of Inductive Power Transfer Systems Considering Bifurcation and Equivalent AC Resistance for Spiral Coils by Alireza Namadmalan (16864236)

    Published 2020
    “…Equivalent AC resistance of spiral coils is modeled based on eddy currents simulations using Finite Element Method (FEM) and Maxwell simulator. Based on the FEM simulations, a new approximation method using separation of variables is proposed as a function of spiral coil's main parameters. …”
  2. 202

    Exploiting Sparsity in Amplify-and-Forward Broadband Multiple Relay Selection by Ala Gouissem (7006463)

    Published 2019
    “…However, most of the techniques in the literature are not suitable for large cooperative networks such as device-to-device and wireless sensor networks that are composed of a massive number of active devices, which significantly increases the relay selection complexity. Therefore, to solve this problem and enhance the spatial and frequency diversity orders of large amplify and forward cooperative communication networks, in this paper, we develop three multiple relay selection and distributed beamforming techniques that exploit sparse signal recovery theory to process the subcarriers using the low complexity orthogonal matching pursuit algorithm (OMP). …”
  3. 203
  4. 204

    Experimental Investigation and Comparative Evaluation of Standard Level Shifted Multi-Carrier Modulation Schemes With a Constraint GA Based SHE Techniques for a Seven-Level PUC Inv... by Atif Iqbal (5504636)

    Published 2019
    “…Different standard multicarrier sinusoidal pulse-width modulation techniques (SPWMs) are adapted for the generation of switching gate signals for the PUC power switches, and these SPWMs are compared with novel optimization-based selective harmonic elimination (SHE) that employs genetic algorithm (GA) for solving nonlinear SHE equation with a constraint that eliminated all third-order harmonics efficiently. …”
  5. 205
  6. 206

    A novel XML document structure comparison framework based-on sub-tree commonalities and label semantics by Tekli, Joe

    Published 2011
    “…Most of them make use of techniques for finding the edit distance between tree structures, XML documents being commonly modeled as Ordered Labeled Trees. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  7. 207

    The Use of Enumerative Techniques in Topological Optimization of Computer Networks Subject to Fault Tolerance and Reliability by Abd-El-barr, Mostafa

    Published 2003
    “…Experimental results obtained from a set of randomly generated networks using the proposed algorithms are presented and compared to those obtained using the existing techniques [1], [2]. …”
    Get full text
    article
  8. 208

    Predicting Plasma Vitamin C Using Machine Learning by Daniel Kirk (17302798)

    Published 2022
    “…<p dir="ltr">Precision Nutrition makes use of personal information about individuals to produce nutritional recommendations that have more utility than general population level recommendations. …”
  9. 209

    Optimized FPGA Implementation of PWAM-Based Control of Three—Phase Nine—Level Quasi Impedance Source Inverter by Syed Rahman (569240)

    Published 2019
    “…Since, PWAM control algorithm is more complex than PSCPWM, FPGA based implementation for PWAM control is discussed. …”
  10. 210

    Artificial intelligence based anomaly detection of energy consumption in buildings: A review, current trends and new perspectives by Yassine Himeur (14158821)

    Published 2021
    “…In this regard, this paper is an in-depth review of existing anomaly detection frameworks for building energy consumption based on artificial intelligence. Specifically, an extensive survey is presented, in which a comprehensive taxonomy is introduced to classify existing algorithms based on different modules and parameters adopted, such as machine learning algorithms, feature extraction approaches, anomaly detection levels, computing platforms and application scenarios. …”
  11. 211

    Enhancing Breast Cancer Diagnosis With Bidirectional Recurrent Neural Networks: A Novel Approach for Histopathological Image Multi-Classification by Rajendra Babu Chikkala (22330876)

    Published 2025
    “…<p dir="ltr">In recent years, deep learning methods have dramatically improved medical image analysis, though earlier models faced difficulties in capturing intricate spatial and contextual details. …”
  12. 212

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…In order to benefit from multiple different classifiers, and exploit their strengths, the use of ensembling algorithms arises, which combine the results of the individual classifiers into a final result to achieve greater precision and thus a better result. …”
    Get full text
  13. 213

    Forward simulation of three-dimensional advection-diffusion using a fundamental solution for a linear flow by Wehbe, Rawan

    Published 2022
    “…We assume that the coefficients that govern this evolution are unknown and we prove that they have to satisfy a coupled system of non-linear first order ODEs. The system is solved numerically using an RK4 scheme. We first check the algorithm against special linear flows with known exact analytical solutions. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  14. 214

    Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks by Mohamed Amjath (17542512)

    Published 2022
    “…This study proposes an analytical method based on sequential quadratic programming (SQP) methodology coupled with a mean value analysis (MVA) algorithm to solve this NP-Hard problem. Furthermore, a discrete event simulation (DES) model is developed to validate the optimisation of non-dominant solutions. …”
  15. 215

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare by Haraty, Ramzi A.

    Published 2007
    “…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  16. 216

    Scalable Nonparametric Supervised Learning for Streaming and Massive Data: Applications in Healthcare Monitoring and Credit Risk by Mohamed Chaouch (17983846)

    Published 2025
    “…Additionally, an online classifier is developed for streaming data, combining online PCA with a kernel-based recursive classifier using a stochastic approximation algorithm. …”
  17. 217

    DRL-Based UAV Path Planning for Coverage Hole Avoidance: Energy Consumption and Outage Time Minimization Trade-Offs by Bahareh Jafari (22501715)

    Published 2025
    “…As such, in addition to avoiding coverage holes, we should also make the outage time as small as possible. By deploying a deep reinforcement learning algorithm, we find optimal UAV paths based on the two families of trajectories: spiral and oval curves, to tackle different design considerations and constraints, in terms of QoS, energy consumption and coverage hole avoidance. …”
  18. 218
  19. 219

    Analyzing Partial Shading in PV Systems Using Wavelet Packet Transform and Empirical Mode Decomposition Techniques by Kais Abdulmawjood (17947784)

    Published 2025
    “…The generated IMF components are then fed into the Random Forest (RF) algorithm designed for shading detection and classification. …”
  20. 220

    Wavelet Analysis- Singular Value Decomposition Based Method for Precise Fault Localization in Power Distribution Networks Using k-NN Classifier by Abhishek Raj (7245425)

    Published 2025
    “…Additionally, the computational efficiency of the algorithm is evidenced by an average processing time of 0.0764 seconds per fault event, making it well-suited for real-time applications.…”