Search alternatives:
method algorithm » mould algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
-
81
Self-Checking Hardware Design for Montgomery Exponentiation-Based Cryptography
Published 2024“…<p dir="ltr">Montgomery exponentiation is widely used for public-key-based cryptography systems. The current state-of-the-art designs for this algorithm are well-analyzed in terms of hardware overhead but are not investigated for faults caused by physical attacks. …”
-
82
Hybrid Deep Learning-based Models for Crop Yield Prediction
Published 2022“…In this study, we developed deep learning-based models to evaluate how the underlying algorithms perform with respect to different performance criteria. …”
-
83
RRT and Octomap based 3D environment exploration and mapping
Published 2020Get full text
doctoralThesis -
84
Acoustic Based Localization of Partial Discharge Inside Oil-Filled Transformers
Published 2022“…<p dir="ltr">This paper addresses the localization of Partial Discharge through a 3D Finite Element Method analysis of acoustic wave propagation inside a 3-phase 35kV transformer with the help of COMSOL Multiphysics software. …”
-
85
Adaptive dissection based subword segmentation of printed Arabic text
Published 2005Get full text
Get full text
article -
86
Development of Modular DC-DC Converters for Low-Speed Electric Vehicles Fast Chargers
Published 2021“…This is due to the fact that the proposed configuration uses only a single capacitor at the input side, avoiding the inherent instability problem caused by the output current sharing control. The controller is examined using a 3-module ISOP DC-DC converter, where the controlled current is following the reflex charging algorithm. …”
-
87
Towards a Unified Arabic Government Services Chatbot Based on Ontology
Published 2020“…These results confirmed that the performance of the proposed algorithm could outperform both a previously developed chatbot-based on ontology and Rashid chatbot as well.…”
Get full text
-
88
Adaptive Fault-Tolerant Communication Based-Control for Parallel Connected Rectifiers
Published 2023“…The master can be selected and changed automatically based on a negotiation algorithm among the connected rectifiers. …”
-
89
Communication-Based Adaptive Overcurrent Protection for Distribution Systems with DistributedGenerators
Published 2012Get full text
doctoralThesis -
90
FPGA-based Parallel Hardware Architecture for Real-time Object Classification
Published 2014Get full text
doctoralThesis -
91
Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants
Published 2024“…It also provides implications for tech-managers and algorithm designers to build effective voice technology for superior user experience.…”
-
92
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
Published 2022“…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. In this paper, we proposed a novel technique in steganography within the digital images such is RGB, Gray Scale, Texture, Aerial images to achieve higher security, imperceptibility, capacity, and robustness as compared with existing methods. …”
-
93
-
94
Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers
Published 2023“…Then, the DT is used for the diagnosis and tolerance of open-switch faults (OSFs) and faults related to voltage and current sensors or for sensorless control. The OSF detection and localization algorithm is implemented based on the dynamic response difference between the physical system and its DT. …”
-
95
A heuristics for HTTP traffic identification in measuring user dissimilarity
Published 2020“…The study utilizes HTTP request method of GET filtering, to develop a heuristic algorithm to identify user-initiated requests. The algorithm was experimentally tested on a group of users, to ascertain the certainty of identifying user-initiated requests. …”
-
96
The use of semantic-based predicates implication to improve horizontal multimedia database fragmentation
Published 2007“…We particularly discuss multimedia primary horizontal fragmentation and focus on semantic-based textual predicates implication required as a pre-process in current fragmentation algorithms in order to partition multimedia data efficiently. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
97
-
98
Hybrid deep learning based threat intelligence framework for Industrial IoT systems
Published 2025“…The proposed approach was also compared against several contemporary deep learning-based architectures and existing benchmark algorithms. …”
-
99
A PLC based power factor controller for a 3-phase induction motor
Published 2000“…The look-up table is prepared according to a measured value of the phase angle between the stator phase voltage and the stator phase current. Implementation of a software algorithm incorporates measuring the power factor angle, selecting the binary pattern according to the control strategy and sending command signals to switch the appropriate capacitors and protection switches. …”
Get full text
Get full text
article -
100
Correlation Clustering with Overlaps
Published 2020“…In other words, data elements (or vertices) will be allowed to be members in more than one cluster instead of limiting them to only one single cluster, as in classical clustering methods. …”
Get full text
Get full text
Get full text
masterThesis