يعرض 161 - 180 نتائج من 470 نتيجة بحث عن '(( elements method algorithm ) OR ((( data processing algorithm ) OR ( cost modeling algorithm ))))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 161
  2. 162

    UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data حسب Behrouz Ahadzadeh (19757022)

    منشور في 2024
    "…Despite its importance, the constantly increasing search space of high-dimensional datasets poses significant challenges to FS methods, including issues like the "curse of dimensionality," susceptibility to local optima, and high computational and memory costs. To overcome these challenges, a new FS algorithm named Uniform-solution-driven Binary Feature Selection (UniBFS) has been developed in this study. …"
  3. 163
  4. 164

    Stochastic management of hybrid AC/DC microgrids considering electric vehicles charging demands حسب Peng, Wang

    منشور في 2020
    "…A novel evolving solution based on flower pollination algorithm is also proposed to solve the problem optimally. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 165
  6. 166
  7. 167
  8. 168
  9. 169
  10. 170

    Prediction the performance of multistage moving bed biological process using artificial neural network (ANN) حسب Fares Almomani (12585685)

    منشور في 2020
    "…To cope with this difficult task and perform an effective and well-controlled BP operation, an artificial neural network (ANN) algorithm was developed to simulate, model, and control a three-stage (anaerobic/anoxic and MBBR) enhanced nutrient removal biological process (ENR-BP) challenging real wastewater. …"
  11. 171

    Net energy–cost optimization of STPV–PDRC integrated greenhouses: Balancing energy production and cooling demand under crop-specific DLI constraints حسب Mohammadreza Gholami (17032317)

    منشور في 2025
    "…Using coupled energy simulation, daylight analysis, and cost modeling, we evaluated material configurations across various representative DLI thresholds, reflecting different crop requirements. …"
  12. 172

    KNNOR: An oversampling technique for imbalanced datasets حسب Ashhadul Islam (16869981)

    منشور في 2021
    "…The proposed technique called K-Nearest Neighbor OveRsampling approach (KNNOR) performs a three step process to identify the critical and safe areas for augmentation and generate synthetic data points of the minority class. …"
  13. 173
  14. 174

    A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group حسب Iqtadar Hussain (14147850)

    منشور في 2023
    "…The presented algorithm is mainly based on the Shannon idea of substitution–permutation network where the process of substitution is performed by the proposed S<sub>8</sub> semifield substitution boxes and permutation operation is performed by the binary cyclic shift of substitution box transformed data. …"
  15. 175
  16. 176

    Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images حسب Ahila A (18394806)

    منشور في 2022
    "…Over the decade, numerous artificial neural network (ANN)-based techniques were adopted in order to diagnose and classify breast cancer due to the unique characteristics of learning key features from complex data via a training process. However, these schemes have limitations like slow convergence and longer training time. …"
  17. 177

    A Parallel Genetic Algorithm for the Geometrically Constrained Site Layout Problem with Unequal-Size Facilities حسب Zouein, Pierrette P.

    منشور في 2010
    "…The problem is characterised by affinity weights used to model transportation costs between facilities, and by geometric constraints between relative positions of facilities on site. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 178

    Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare حسب Haraty, Ramzi A.

    منشور في 2007
    "…With all the preventive methods, malicious users still find new methods that overcome the system security, and access and modify the sensitive information. To make the process of damage assessment and recovery fast and efficient and in order not to scan the whole log, researchers have proposed different methods for segmenting the log, and accordingly presented different damage assessment and recovery algorithms. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 179

    Digital twin in energy industry: Proposed robust digital twin for power plant and other complex capital-intensive large engineering systems حسب Ahmad K. Sleiti (14778229)

    منشور في 2022
    "…Furthermore, this paper demonstrates the advantages of the developed ADL algorithm approach and DSM prediction of the DT using vector autoregressive model for anomaly detection in utility gas turbines with data from an operational power plant.…"
  20. 180

    Coalition game theoretic P2P trading in a distribution network integrity-ensured local energy market حسب M., Imran Azim

    منشور في 2023
    "…To do so, a coalition game theoretic-model is adopted to model the mutual trading interactions between participating purchasers and sellers in the LEM, in which energy is purchased/sold at a rate lower/higher than the business-as-usual purchase/sell price while the margin of the LEM operator is locked on. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article