بدائل البحث:
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
rl algorithm » rd algorithm (توسيع البحث), carlo algorithm (توسيع البحث), _ algorithms (توسيع البحث)
element » elements (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
rl algorithm » rd algorithm (توسيع البحث), carlo algorithm (توسيع البحث), _ algorithms (توسيع البحث)
element » elements (توسيع البحث)
-
81
Evaluation of Aerosol Optical Depth and Aerosol Models from VIIRS Retrieval Algorithms over North China Plain
منشور في 2017"…Secondly, we evaluate the aerosol model types assumed by each algorithm, as well as the aerosol optical properties used in the AOD retrievals. …"
-
82
-
83
An efficient failure-resilient mutual exclusion algorithm for distributed systems leveraging a novel zero-message overlay structure
منشور في 2024"…In addition, for the same architecture, when both tree arity and cardinality are 4, after 250 epochs, the node load has demonstrated minimal variation and remains in close proximity to the original load. Moreover, experimental results also reveal a graceful degradation of algorithm performance. …"
-
84
Sensitivity analysis and genetic algorithm-based shear capacity model for basalt FRC one-way slabs reinforced with BFRP bars
منشور في 2023"…A 3D finite element model was first developed and validated against available experimental results. The developed model is then used to conduct a sensitivity analysis considering five factors that influence the shear behavior of BFRC-BFRP one-way slabs. …"
-
85
An Artificial Neural Network for Online Tuning of Genetic Algorithm Based PI Controller for Interior Permanent Magnet Synchronous Motor–Drive
منشور في 2006"…At each operating condition a genetic algorithm (GA) is used to optimize proportional-integral (PI) controller parameters in a closed loop vector control scheme. …"
احصل على النص الكامل
article -
86
-
87
Variable Selection in Data Analysis: A Synthetic Data Toolkit
منشور في 2024"…This paper aims to address the significant lack of formal evaluation benchmarks for feature selection algorithms (FSAs). To evaluate FSAs effectively, controlled environments are required, and the use of synthetic datasets offers significant advantages. …"
احصل على النص الكامل
article -
88
Development of an Optimization Scheme for A Fixed-Wing UAV Long Endurance with PEMFC and Battery
منشور في 2018احصل على النص الكامل
doctoralThesis -
89
Digital Image Watermarking Using Balanced Multiwavelets
منشور في 2006"…In this paper, a robust watermarking algorithm using balanced multiwavelet transform is proposed. …"
احصل على النص الكامل
article -
90
Real-Time Implementation of High Performance Control Scheme for Grid-Tied PV System for Power Quality Enhancement Based on MPPC-SVM Optimized by PSO Algorithm
منشور في 2018"…Concerning DC bus voltage of the inverter, the anti-windup PI controller is tuned offline using the particle swarm optimization algorithm to deliver optimal performance in DC bus voltage regulation. …"
-
91
Predicting Android Malware Using Evolution Networks
منشور في 2025"…We combine this model with genetic algorithms to optimize its parameters and return the best state transition probabilities, and we predict future malware accordingly. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
92
Mobile Robot Trajectory Tracking Using Neural Networks
منشور في 2009احصل على النص الكامل
doctoralThesis -
93
The use of configurable computing for computational kernels in scientific simulations
منشور في 2006"…Experimental results obtained on a Xilinx field-programmable gate array (FPGA) are presented for the proposed algorithms.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
94
An easy-to-use scalable framework for parallel recursive backtracking
منشور في 2013"…Many of these algorithms use recursive backtracking as their core solution paradigm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
95
Malicious URL and Intrusion Detection using Machine Learning
منشور في 2024"…The second dataset has six classes of different network intrusion cyber-attacks: “normal”, “blackhole”, “TCP-SYN”, “PortScan”, “Diversion”, and “Overflow”. Experimental results demonstrated that the ML algorithms were able to achieve high accuracy in predicting website maliciousness and intrusion detection. …"
احصل على النص الكامل
article -
96
Using C++ to Calculate SO(10) Tensor Couplings
منشور في 2021"…The output is then produced in LATEX, so that it is universally readable and sufficiently expressive. Through the use of this software, SO(10) coupling analysis can be performed in a way that minimizes calculation time, eliminates errors, and allows for experimentation with couplings that have not been computed before in the literature. …"
احصل على النص الكامل
article -
97
Stacking-based ensemble learning for remaining useful life estimation
منشور في 2023"…In this study, predictive models that estimate the remaining useful life of turbofan engines have been developed using deep learning algorithms on NASA’s turbofan engine degradation simulation dataset. …"
-
98
RFID localization using single reader antenna. (c2014)
منشور في 2016"…Our scheme is based on Power Map Matching algorithm. The proposed method employs the use of a Single Stationary Reader Antenna and multitags placed on the asset. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
99
Modulation With Metaheuristic Approach for Cascaded-MPUC49 Asymmetrical Inverter With Boosted Output
منشور في 2020"…For the calculation of optimum angles, a meta-heuristic based Genetic Algorithm (GA) technique is employed. The generation of 49-level output requires 24 transitions in one quarter of a cycle. …"
-
100