Search alternatives:
method algorithm » mould algorithm (Expand Search)
data detection » data injection (Expand Search)
Showing 281 - 300 results of 391 for search '(( elements method algorithm ) OR ((( data detection algorithm ) OR ( data including algorithm ))))', query time: 0.11s Refine Results
  1. 281

    Active distribution network type identification method of high proportion new energy power system based on source-load matching by Qinlin, Shi

    Published 2023
    “…Firstly, the typical daily output scenarios of DG are extracted by clustering method, and the generalized load curve model is solved by the optimization algorithm to obtain the source load operation data; Secondly, calculate the source-load matching indicators (including matching performance, matching degree, and matching rate) according to the source load data of each region, and identify the distribution network type according to the range of the index values; Finally, several indicators are introduced to quantify the characteristics of different types of distribution networks. …”
    Get full text
    Get full text
    Get full text
    article
  2. 282

    Transaction Dependency Based Approach for Database Damage Assessment Using a Matrix by Haraty, Ramzi Ahmed

    Published 2017
    “…Companies are sharing vast online critical data, which exposes their databases to malicious attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  3. 283

    Approximate XML structure validation based on document–grammar tree similarity by Tekli, Joe

    Published 2015
    “…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  4. 284
  5. 285

    Corona power loss computation in bundled bipolar conductors by Al-Hamouz, Z.M.

    Published 2000
    “…In this paper, a finite element (FE) based algorithm devoted for the computation of the corona current and hence the corona power loss associated with bundled bipolar high voltage direct current (HVDC) conductors is presented. …”
    Get full text
    Get full text
    article
  6. 286
  7. 287

    Approximate XML structure validation technical report by Tekli, Joe

    Published 2014
    “…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…”
    Get full text
    Get full text
    Get full text
    article
  8. 288

    Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases by Muhammad Ali Muzammil (17910611)

    Published 2024
    “…The use of AI in ECG analysis has several benefits, including the quick and precise detection of problems like arrhythmias, silent cardiac illnesses, and left ventricular failure. …”
  9. 289
  10. 290

    Copy number variations in the genome of the Qatari population by Khalid A. Fakhro (3158862)

    Published 2015
    “…Genotyping intensities and genome sequencing data from 97 Qataris were analyzed with four different algorithms and integrated to discover 16,660 high confidence CNV regions (CNVRs) in the total population, affecting ~28 Mb in the median Qatari genome. …”
  11. 291

    A hybrid model to predict the pressure gradient for the liquid-liquid flow in both horizontal and inclined pipes for unknown flow patterns by Md Ferdous Wahid (13485799)

    Published 2023
    “…The important feature subset is identified using the modified Binary Grey Wolf Optimization Particle Swarm Optimization (BGWOPSO) algorithm. The MLs' performance is evaluated using metrics including accuracy, sensitivity, specificity, and F1-score for the M1, and coefficient of variation of root mean squared error, mean absolute percentage error (MAPE), and median absolute percentage error for the M2. …”
  12. 292
  13. 293

    A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security by Shitharth Selvarajan (14157976)

    Published 2024
    “…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …”
  14. 294
  15. 295
  16. 296

    Newton-Raphson based adaptive inverse control scheme for tracking of nonlinear dynamic plants by Shafiq, M.

    Published 2006
    “…The U-model is utilized to design an adaptive inverse controller by using a simple root-solving algorithm of Newton-Raphson. The synergy of U-model with AIC structure has provided an effective and straight forward method for adaptive tracking of nonlinear plants. …”
    Get full text
    Get full text
    article
  17. 297

    The Role of Artificial Intelligence in Decoding Speech from EEG Signals: A Scoping Review by Uzair Shah (15740699)

    Published 2022
    “…The most prominent ML algorithm was a support vector machine, and the DL algorithm was a convolutional neural network. …”
  18. 298

    A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem by Habchi, Wassim

    Published 2008
    “…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …”
    Get full text
    Get full text
    Get full text
    article
  19. 299

    The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions by Abdulmalik Alwarafy (17984104)

    Published 2022
    “…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …”
  20. 300

    Uplink Noma in UAV-Assisted IoT Networks by Mrad, Ali

    Published 2022
    “…The first part of the thesis considers the problem of data collection from time-constrained IoT devices through deploying a UAV with uplink NOMA. …”
    Get full text
    Get full text
    Get full text
    masterThesis