Search alternatives:
using algorithm » cosine algorithm (Expand Search)
update » updated (Expand Search)
Showing 281 - 300 results of 904 for search '(( elements update algorithm ) OR ((( data using algorithm ) OR ( designed using algorithm ))))', query time: 0.13s Refine Results
  1. 281

    Design of adaptive arrays based on element position perturbations by Dawoud, M.M.

    Published 1993
    “…The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …”
    Get full text
    Get full text
    article
  2. 282

    Convergence and steady-state analysis of the normalized least mean fourth algorithm by Zerguine, Azzedine

    Published 2007
    “…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …”
    article
  3. 283

    Convergence and steady-state analysis of the normalized least mean fourth algorithm by Zerguine, Azzedine

    Published 2007
    “…Unlike the LMF algorithm, the convergence behavior of the NLMF algorithm is independent of the input data correlation statistics. …”
    Get full text
    article
  4. 284

    Incorporation of Robust Sliding Mode Control and Adaptive Multi-Layer Neural Network-Based Observer for Unmanned Aerial Vehicles by Zainab Akhtar (15192184)

    Published 2024
    “…The MLNN observer, employing a modified back-propagation algorithm, is used for the quadrotor’s state estimation. …”
  5. 285
  6. 286

    A Genetic Algorithm for Improving Accuracy of Software Quality Predictive Models by Azar, Danielle

    Published 2010
    “…In this work, we present a genetic algorithm to optimize predictive models used to estimate software quality characteristics. …”
    Get full text
    Get full text
    Get full text
    article
  7. 287

    Novel Peak Detection Algorithms for Pileup Minimization in Gamma Ray Spectroscopy by Raad, M.W.

    Published 2006
    “…This study uses the above facility in developing algorithms for digitally determining the basic pulse parameters and tackling the problem of pulse pile-up in Gamma-ray spectroscopy. …”
    Get full text
    Get full text
    article
  8. 288
  9. 289

    Efficient heuristic algorithms for influence propagation in social networks. (c2018) by Lamaa, Karine H.

    Published 2018
    “…Then we introduce the notion of an influence propagation function and use it to design an efficient algorithm across all types of networks. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  10. 290

    Wild Blueberry Harvesting Losses Predicted with Selective Machine Learning Algorithms by Humna Khan (17541972)

    Published 2022
    “…The outcomes revealed that these ML algorithms can be useful in predicting ground losses during wild blueberry harvesting in the selected fields.…”
  11. 291

    Evolutionary algorithms, simulated annealing and tabu search: a comparative study by Youssef, H.

    Published 2020
    “…The termevolutionary algorithmis used to refer to any probabilistic algorithmwhose design is inspired by evolutionary mechanisms found in biological species. …”
    Get full text
    article
  12. 292

    A novel design technique for generating building form by KAYED, MAYS N. A.

    Published 2018
    “…The theoretical framework of the technique was successfully tested out and validated by implementing it over serious of examples that are categorized into three groups: examples directed to test out the proposed variables in each process, examples directed to validate the ability of whole technique to generate forms for a hypothetical project requirements and examples of scripting the mechanisms using the algorithmic editor interface and the visual programming language Grasshopper incorporated with Rhinoceros 3D software."…”
    Get full text
  13. 293

    Design and analysis of efficient and secure elliptic curve cryptoprocessors. by Al-Somani, Turki Faisal

    Published 2006
    “…Elliptic Curve Cryptosystems have attracted many researchers and have been included in many standards such as IEEE, ANSI, NIST, SEC and WTLS. The ability to use smaller keys and computationally more efficient algorithms compared with earlier public key cryptosystems such as RSA and ElGamal are two main reasons why elliptic curve cryptosystems are becoming more popular. …”
    Get full text
    masterThesis
  14. 294

    Framework for rapid design and optimisation of immersive battery cooling system by Ali Almshahy (23544823)

    Published 2025
    “…Two key parameters are optimised, namely: battery gap spacing (3–10 mm) and inlet/outlet width (5–15 mm), via Optimal Latin Hypercube Sampling, Support Vector Regression, and GDE3 algorithm. Palm biodiesel is used as a dielectric coolant in the proposed system to preserve LIB temperature within 20–40°C, preventing thermal runaway and ensuring a lightweight BTMS design. …”
  15. 295
  16. 296

    A new tabu search algorithm for the long-term hydro scheduling problem by Mantawy, A.H.

    Published 2002
    “…The algorithm is based on using the short-term memory of the tabu search (TS) approach to solve the nonlinear optimization problem in continuous variables of the LTHSP. …”
    Get full text
    Get full text
    article
  17. 297

    Wearable wrist to finger photoplethysmogram translation through restoration using super operational neural networks based 1D-CycleGAN for enhancing cardiovascular monitoring by Sakib Mahmud (15302404)

    Published 2024
    “…TTR-GAN comprises cascaded dual-stage 1D Cycle Generative Adversarial Networks (1D-CycleGANs) constructed using Super-ONNs. In the first phase, corrupted wPPG waveforms are blindly restored using a 1D-CycleGAN-based restoration framework. …”
  18. 298

    UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks by Ebrahimi, Dariush

    Published 2018
    “…To this end, we propose the utilization of Unmanned Aerial Vehicles (UAVs) to collect data in dense wireless sensor networks (WSNs) using projection-based Compressive Data Gathering (CDG) as a novel solution methodology. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  19. 299

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models by Osama Bassam J. Rabie (21323741)

    Published 2024
    “…Moreover, the DBRF classification model is deployed to categorize the normal and attacking data flows using optimized features. Here, the proposed DRF-DBRF security model's performance is validated and tested using five different and popular IoT benchmarking datasets. …”
  20. 300

    LaScaDa: A Novel Scalable Topology for Data Center Network by Zina Chkirbene (16869987)

    Published 2020
    “…LaScaDa forwards packets between nodes using a new hierarchical row-based routing algorithm. …”