Search alternatives:
processing algorithm » processing algorithms (Expand Search)
method algorithm » mould algorithm (Expand Search)
Showing 321 - 340 results of 571 for search '(( elements method algorithm ) OR ((( image processing algorithm ) OR ( based method algorithm ))))', query time: 0.13s Refine Results
  1. 321

    Decomposition-based wind power forecasting models and their boundary issue: An in-depth review and comprehensive discussion on potential solutions by Yinsong Chen (16685508)

    Published 2022
    “…Then, we systematically summarize commonly available boundary issue solutions into three categories, namely algorithm-based solutions, sampling-strategy-based solutions and iteration-based solutions. …”
  2. 322
  3. 323

    StackDPPred: Multiclass prediction of defensin peptides using stacked ensemble learning with optimized features by Muhammad Arif (769250)

    Published 2024
    “…We believe, StackDPPred could serve as a valuable tool accelerating the screening of large-scale DPs and peptide-based drug discovery process.</p><h2>Other Information</h2> <p> Published in: Methods<br> License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1016/j.ymeth.2024.08.001" target="_blank">https://dx.doi.org/10.1016/j.ymeth.2024.08.001</a></p>…”
  4. 324

    An enhanced binary Rat Swarm Optimizer based on local-best concepts of PSO and collaborative crossover operators for feature selection by Abu Zitar, Raed

    Published 2022
    “…FS is an important data reduction step in data mining which finds the most representative features from the entire data. Many FS-based swarm intelligence algorithms have been used to tackle FS. …”
  5. 325
  6. 326
  7. 327
  8. 328

    Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval by Mohammed Tahar Habib Kaib (21633176)

    Published 2024
    “…Generally, RKPCA reduces the number of samples in the training data set and then builds the KPCA model based on this data set. In this paper, the proposed algorithm selects relevant observations from the original data set by utilizing a class interval technique (i.e. histogram) to maintain a bunch of representative samples from each bin. …”
  9. 329

    An Effective Hybrid NARX-LSTM Model for Point and Interval PV Power Forecasting by Mohamed Massaoudi (16888710)

    Published 2021
    “…Then, the stacked LSTM model, optimized by Tabu search algorithm, uses the residual error correction associated with the original data to produce a point and interval PVPF. …”
  10. 330

    A Fully Optical Laser Based System for Damage Detection and Localization in Rail Tracks Using Ultrasonic Rayleigh Waves: A Numerical and Experimental Study by Masurkar, Faeez

    Published 2022
    “…Further, As the quality of received signals differs at different sensing points as a result of the surface conditions of the specimen, the Self Adaptive Smart Algorithm (SASA) method was adopted to filter out the noise and accurately pinpoint the defect reflected wave packet which ultimately aids in better detection and localization. …”
    Get full text
  11. 331

    Integrated Energy Optimization and Stability Control Using Deep Reinforcement Learning for an All-Wheel-Drive Electric Vehicle by Reza Jafari (3494018)

    Published 2025
    “…To this end, three model-free DRL-based methods, based on deep deterministic policy gradient (DDPG), twin delayed deep deterministic policy gradient (TD3), and TD3 enhanced with curriculum learning (CL TD3), are developed for determining optimal yaw moment control and energy optimization online. …”
  12. 332

    Blue collar laborers’ travel pattern recognition: Machine learning classifier approach by Aya Hasan Alkhereibi (17151070)

    Published 2021
    “…The research methodology undertaken in this paper comprises a combination of different machine learning techniques, predominantly by applying clustering and classification methods. A bagged Clustering algorithm was employed to identify the number of clusters, then the C-Means algorithm and the Pamk algorithm were implemented to validate the results. …”
  13. 333

    Spectral energy balancing system with massive MIMO based hybrid beam forming for wireless 6G communication using dual deep learning model by Ramesh Sundar (19326046)

    Published 2024
    “…<p>This work aims to provide an effective hybrid beam forming method with Dual-Deep-Network to overcome overhead for mm-wave massive MIMO systems. …”
  14. 334

    Wide area monitoring system operations in modern power grids: A median regression function-based state estimation approach towards cyber attacks by Haris M. Khalid (17017743)

    Published 2023
    “…The algorithm was stationed at each monitoring node using interacting multiple model (IMM)-based fusion architecture. …”
  15. 335

    Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices by Neder Karmous (19743430)

    Published 2024
    “…We employed an ML method based on Random Forest (RF), Logistic Regression (LR), k-Nearest Neighbors (kNN), and Naive Bayes (NB) with a One-versus-Rest (OvR) strategy and then compared our work to other related works. …”
  16. 336

    Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment by Zakaria Tolba (16904718)

    Published 2022
    “…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …”
  17. 337

    Wearable wrist to finger photoplethysmogram translation through restoration using super operational neural networks based 1D-CycleGAN for enhancing cardiovascular monitoring by Sakib Mahmud (15302404)

    Published 2024
    “…Current signal processing techniques, and even state-of-the-art machine learning algorithms, frequently struggle to effectively restore the inherent bodily signals amidst the array of randomly generated distortions. …”
  18. 338

    Navigating the Landscape of Deep Reinforcement Learning for Power System Stability Control: A Review by Mohamed Sadok Massaoudi (17984071)

    Published 2023
    “…<p dir="ltr">The widespread penetration of inverter-based resources has profoundly impacted the electrical stability of power systems (PSs). …”
  19. 339

    An Adaptive Sliding Mode Control for a Dual Active Bridge Converter With Extended Phase Shift Modulation by Farzaneh Bagheri (17947811)

    Published 2023
    “…The conventional single-phase shift (SPS) modulation-based DAB converter is known to be inefficient. Hence, an optimization algorithm based on the Lagrange multiplier method (LMM) is proposed to minimize both backflow power and inductor current stress simultaneously. …”
  20. 340