Search alternatives:
method algorithm » mould algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
elements rd » elements _ (Expand Search)
Showing 321 - 340 results of 1,006 for search '(( elements rd algorithm ) OR ((( data using algorithm ) OR ( based method algorithm ))))', query time: 0.15s Refine Results
  1. 321

    Convergence and steady-state analysis of the normalized least mean fourth algorithm by Zerguine, Azzedine

    Published 2007
    “…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …”
    article
  2. 322

    Convergence and steady-state analysis of the normalized least mean fourth algorithm by Zerguine, Azzedine

    Published 2007
    “…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …”
    Get full text
    article
  3. 323
  4. 324

    Assessment of static pile design methods and non-linear analysis of pile driving by Abou-Jaoude, Grace G.

    Published 2006
    “…The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  5. 325

    A Genetic Algorithm for Improving Accuracy of Software Quality Predictive Models by Azar, Danielle

    Published 2010
    “…In this work, we present a genetic algorithm to optimize predictive models used to estimate software quality characteristics. …”
    Get full text
    Get full text
    Get full text
    article
  6. 326

    Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms by Humna Khan (17541972)

    Published 2022
    “…The outcomes revealed that these ML algorithms can be useful in predicting ground losses during wild blueberry harvesting in the selected fields.…”
  7. 327

    Performance Analysis of a Three-to-Five Phase Dual Matrix Converter Based on Space Vector Pulse Width Modulation by Khaliqur Rahman (10214098)

    Published 2019
    “…<p dir="ltr">In this paper, space vector pulse width modulation (SVPWM)-based algorithms for a five-phase open-end load fed from dual matrix converter (DMC) have been proposed. …”
  8. 328

    Advancing Data Center Networks: A Focus on Energy and Cost Efficiency by Zina Chkirbene (16869987)

    Published 2023
    “…These topologies must incorporate fault-tolerant and efficient routing algorithms. Consequently, the data center network topology must dynamically adapt to ever-changing application requirements. …”
  9. 329

    Evolutionary Game-Based Battery Scheduling: A Comparative Study for Prosumers in Smart Grids by Anas Karaki (17947808)

    Published 2025
    “…A comprehensive comparative analysis is conducted between the proposed EGT algorithm and established methods such as centralized optimization (CO), game theory (GT), and auction-based approaches. …”
  10. 330

    Heat rate curve approximation for power plants without data measuring devices by Poullikkas, Andreas

    Published 2012
    “…In this work, a numerical method, based on the one-dimensional finite difference technique, is proposed for the approximation of the heat rate curve, which can be applied for power plants in which no data acquisition is available. …”
    Get full text
    article
  11. 331
  12. 332
  13. 333

    Machine Learning–Based Approach for Identifying Research Gaps: COVID-19 as a Case Study by Alaa Abd-alrazaq (17058018)

    Published 2024
    “…We used the COVID-19 pandemic as a case study.</p><h3>Methods</h3><p dir="ltr">We conducted an analysis to identify research gaps in COVID-19 literature using the COVID-19 Open Research (CORD-19) data set, which comprises 1,121,433 papers related to the COVID-19 pandemic. …”
  14. 334

    A data envelopment analysis model for opinion leaders’ identification in social networks by Hamed Baziyad (19273738)

    Published 2024
    “…Social Network Analysis (SNA)-based OLs finding methods deal with a considerable amount of data due to using entire relationships between all of the users in a network, which makes the algorithms time-consuming. …”
  15. 335

    Orthogonal Learning Rosenbrock’s Direct Rotation with the Gazelle Optimization Algorithm for Global Optimization by Abu Zitar, Raed

    Published 2022
    “…Moreover, eight data clustering problems taken from the UCI repository were tested to verify the proposed method’s performance further. The IGOA was compared with several other proposed meta-heuristic algorithms. …”
    Get full text
  16. 336

    A time-domain algorithm for the analysis of second-harmonicgeneration in nonlinear optical structures by Al-Sunaidi, M. A.

    Published 2000
    “…A time-domain simulator of integrated optical structures containing second-order nonlinearities is presented. The simulation algorithm is based on nonlinear wave equations representing the propagating fields and is solved using the finite-difference time-domain method. …”
    article
  17. 337

    A time-domain algorithm for the analysis of second-harmonicgeneration in nonlinear optical structures by Alsunaidi, M.A.

    Published 2000
    “…A time-domain simulator of integrated optical structures containing second-order nonlinearities is presented. The simulation algorithm is based on nonlinear wave equations representing the propagating fields and is solved using the finite-difference time-domain method. …”
    Get full text
    Get full text
    article
  18. 338

    Integrating Genetic Algorithms, Tabu Search, And Simulated Annealing For The Unit Commitment Problem by Montawy, A.H.

    Published 2020
    “…This paper presents a new algorithm based on integrating genetic algorithms, tabu search and simulated annealing methods to solve the unit commitment problem. …”
    Get full text
    article
  19. 339

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models by Osama Bassam J. Rabie (21323741)

    Published 2024
    “…Moreover, the DBRF classification model is deployed to categorize the normal and attacking data flows using optimized features. Here, the proposed DRF-DBRF security model's performance is validated and tested using five different and popular IoT benchmarking datasets. …”
  20. 340

    LaScaDa: A Novel Scalable Topology for Data Center Network by Zina Chkirbene (16869987)

    Published 2020
    “…LaScaDa forwards packets between nodes using a new hierarchical row-based routing algorithm. …”