بدائل البحث:
processing algorithm » processing algorithms (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
based control » case control (توسيع البحث)
يعرض 261 - 280 نتائج من 602 نتيجة بحث عن '(( elements method algorithm ) OR ((( data processing algorithm ) OR ( based control algorithm ))))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 261
  2. 262
  3. 263

    Efficient multi-objective neural architecture search framework via policy gradient algorithm حسب Bo Lyu (16522643)

    منشور في 2024
    "…<p>Differentiable architecture search plays a prominent role in Neural Architecture Search (NAS) and exhibits preferable efficiency than traditional heuristic NAS methods, including those based on evolutionary algorithms (EA) and reinforcement learning (RL). …"
  4. 264

    Stochastic management of hybrid AC/DC microgrids considering electric vehicles charging demands حسب Peng, Wang

    منشور في 2020
    "…A novel evolving solution based on flower pollination algorithm is also proposed to solve the problem optimally. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 265
  6. 266
  7. 267
  8. 268

    An Intelligent and Low-Cost Eye-Tracking System for Motorized Wheelchair Control حسب Mahmoud Dahmani (18810247)

    منشور في 2020
    "…This required modifying a motorized wheelchair to adapt it to the predictions output by the gaze estimation algorithm. The wheelchair control can bypass any decision made by the gaze estimator and immediately halt its motion with the help of an array of proximity sensors, if the measured distance goes below a well-defined safety margin. …"
  9. 269

    KNNOR: An oversampling technique for imbalanced datasets حسب Ashhadul Islam (16869981)

    منشور في 2021
    "…The proposed technique called K-Nearest Neighbor OveRsampling approach (KNNOR) performs a three step process to identify the critical and safe areas for augmentation and generate synthetic data points of the minority class. …"
  10. 270

    Data damage assessment and recovery algorithm from malicious attacks in healthcare data sharing systems حسب Haraty, Ramzi A.

    منشور في 2016
    "…Hence, this presents a need for fast and efficient damage assessment and recovery algorithms. In this paper, we present an efficient data damage assessment and recovery algorithm to delete malicious transactions and recover affected transactions in a data source in a health care system based on the concept of the matrix. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 271
  12. 272

    Analysis of control strategies for smoothing of solar PV fluctuations with storage devices حسب G.V. Brahmendra Kumar (17337760)

    منشور في 2023
    "…Energy storage systems (ESSs)are often used to mitigate power fluctuations in the grid through various control algorithms. These algorithms create an ESS power reference that opposes the variations of the PV and reduces them to an acceptable value. …"
  13. 273

    Machine Learning-Driven Prediction of Corrosion Inhibitor Efficiency: Emerging Algorithms, Challenges, and Future Outlooks حسب Najam Us Sahar Riyaz (22927843)

    منشور في 2025
    "…At the same time, virtual sample augmentation and genetic algorithm feature selection elevate sparse data performance, raising k-nearest neighbor models from R<sup>2</sup> = 0.05 to 0.99 in a representative thiophene set. …"
  14. 274
  15. 275
  16. 276

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group حسب Iqtadar Hussain (14147850)

    منشور في 2023
    "…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …"
  17. 277

    Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images حسب Ahila A (18394806)

    منشور في 2022
    "…Over the decade, numerous artificial neural network (ANN)-based techniques were adopted in order to diagnose and classify breast cancer due to the unique characteristics of learning key features from complex data via a training process. However, these schemes have limitations like slow convergence and longer training time. …"
  18. 278
  19. 279

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare حسب Haraty, Ramzi A.

    منشور في 2007
    "…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 280

    A simplified sliding‐mode control method for multi‐level transformerless DVR حسب Hasan Komurcugil (16388513)

    منشور في 2022
    "…<p dir="ltr">Here, a finite-control-set sliding-mode control (FCS-SMC) method is proposed for single-phase three-level T-type inverter-based transformerless dynamic voltage restorers (TDVRs). …"