بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
system » systems (توسيع البحث)
يعرض 181 - 200 نتائج من 1,022 نتيجة بحث عن '(( elements method algorithm ) OR ((( tests using algorithm ) OR ( system using algorithm ))))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 181
  2. 182

    Classifying Maqams of Qur'anic Recitations Using Deep Learning حسب Shahriar, Sakib

    منشور في 2021
    "…An accuracy of 95.7% on the test set is obtained using a 5-layer deep ANN which was trained using 26 input features. …"
    احصل على النص الكامل
    article
  3. 183
  4. 184

    Limiting the Collection of Ground Truth Data for Land Use and Land Cover Maps with Machine Learning Algorithms حسب Usman Ali (6586886)

    منشور في 2022
    "…This paper aimed at evaluating the efficiency of machine learning (ML) in limiting the use of ground truth data for LULC maps. This was accomplished by (1) extracting reliable LULC information from Sentinel-2 and Landsat-8 s images, (2) generating remote sensing indices used to train ML algorithms, and (3) comparing the results with ground truth data. …"
  5. 185
  6. 186

    Contingency analysis of bulk power system using neural networks حسب Maghrabi, H.

    منشور في 1998
    "…Radial basis function networks (RBFNs) are used for the contingency evaluation of bulk power systems. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 187

    Optimal design of power system stabilizers using evolutionary programming حسب Abido, M.A.

    منشور في 2002
    "…The optimal design of power system stabilizers (PSSs) using evolutionary programming (EP) optimization technique is presented in this paper. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 188

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts حسب ALSHAMSI, SUROUR

    منشور في 2022
    "…As a function of the proposed objective, ensembling algorithms applicable to network security have been investigated and evaluated, and a methodology for detecting infected PAGE 2 hosts using ensembling has been developed, based on experiments designed and tested with real datasets. …"
    احصل على النص الكامل
  9. 189

    An efficient failure-resilient mutual exclusion algorithm for distributed systems leveraging a novel zero-message overlay structure حسب Mouna Rabhi (17086969)

    منشور في 2024
    "…<p>In this paper, we provide a novel failure-resilient token-based mutual exclusion (ME) algorithm for distributed systems. Like a few other solutions in the literature, the proposed solution leverages a logical tree as its underlying topology. …"
  10. 190
  11. 191
  12. 192
  13. 193

    Incremental Genetic Algorithm حسب Mansour, Nashat

    منشور في 2006
    "…If these problems are not small in size, it becomes costly to use a genetic algorithm to reoptimize them after each modification. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 194
  15. 195
  16. 196
  17. 197

    Performance driven standard-cell placement using the geneticalgorithm حسب Youssef, H.

    منشور في 1995
    "…Current placement systems attempt to optimize several objectives, namely area, connection length, and timing performance. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 198

    Stochastic Programming for Hub Energy Management Considering Uncertainty Using Two-Point Estimate Method and Optimization Algorithm حسب Ali S. Alghamdi (17541711)

    منشور في 2023
    "…The standard ARO algorithm is developed to mimic the foraging behavior of rabbits, and in this work, the algorithm’s effectiveness in avoiding premature convergence is improved by using the dystudynamic inertia weight technique. …"
  19. 199
  20. 200

    A standalone RFID indoor positioning system using passive tags حسب Saab, Samer S.

    منشور في 2011
    "…The concept is based on an object carrying an RFID reader module, which reads low-cost passive tags installed next to the object path. A positioning system using a Kalman filter is proposed. The inputs of the proposed algorithm are the measurements of the backscattered signal power propagated from nearby RFID tags and a tag-path position database. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article