Showing 1 - 20 results of 100 for search '(( models cosine algorithm ) OR ((( present making algorithm ) OR ( level coding algorithm ))))', query time: 0.14s Refine Results
  1. 1

    Economic load dispatch using memetic sine cosine algorithm by Abu Zitar, Raed

    Published 2022
    “…In this paper, the economic load dispatch (ELD) problem which is an important problem in electrical engineering is tackled using a hybrid sine cosine algorithm (SCA) in a form of memetic technique. …”
    Get full text
  2. 2
  3. 3

    High-Accurate Parameter Identification of PEMFC Using Advanced Multi-Trial Vector-Based Sine Cosine Meta-Heuristic Algorithm by Badreddine Kanouni (23073244)

    Published 2025
    “…The trigonometric function-based sine cosine algorithm (SCA) may solve such problems, but it traps in local optima, making it inappropriate for larger optimization tasks. …”
  4. 4
  5. 5

    The Impact of AI on Decision-Making in Educational Management: Benefits, Risks, and Ethical Concerns by JA’AROUN, WAED YOUSEF

    Published 2024
    “…AI technologies offer significant advantages, such as data-driven insights, improved efficiency, and enhanced predictive capabilities, which can support educational leaders in making more informed decisions. However, the adoption of AI also presents challenges, including potential biases in algorithms, privacy concerns, and the risk of an over-reliance on automated systems. …”
    Get full text
  6. 6

    Large language models for code completion: A systematic literature review by Rasha Ahmad Husein (19744756)

    Published 2024
    “…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …”
  7. 7

    A matrix-based damage assessment and recovery algorithm by Haraty, Ramzi A.

    Published 2014
    “…With all the preventive methods, malicious users still find new ways to overcome the system security and access and modify sensitive information. To make the process of damage assessment and recovery fast and effective (not scanning the entire log), researchers have proposed different methods for segmenting the log file, and accordingly presented different damage assessment and recovery algorithms. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 8

    A hybrid genetic algorithm for task allocation in multicomputers by Mansour, Nashat

    Published 2018
    “…A hybrid genetic algorithm for the task allocation problem (HGATA) in multicomputers is presented. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  9. 9
  10. 10

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach by Sarif, Bambang

    Published 2006
    “…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …”
    Get full text
    Get full text
    article
  11. 11

    An enhanced k-means clustering algorithm for pattern discovery in healthcare data by Haraty, Ramzi A.

    Published 2015
    “…Mainly, we study k-means clustering algorithms on large datasets and present an enhancement to k-means clustering, which requires k or a lesser number of passes to a dataset. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  12. 12

    An image processing and genetic algorithm-based approach for the detection of melanoma in patients by Tokajian, Sima

    Published 2018
    “…Hence, there is a great need for a new automated approach in order to make diagnosis more reliable. In this paper, we present a twophase technique to classify images of lesions into benign or malignant. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  13. 13
  14. 14
  15. 15

    Using machine learning algorithm for detection of cyber-attacks in cyber physical systems by Almajed, Rasha

    Published 2022
    “…Such data can be parsed using ML and AI approaches in designed to check attacks on CPSs. We present the new framework for the detection of cyberattacks, which makes use of AI and ML. …”
    Get full text
    Get full text
  16. 16

    Optimized FPGA Implementation of PWAM-Based Control of Three—Phase Nine—Level Quasi Impedance Source Inverter by Syed Rahman (569240)

    Published 2019
    “…Transient analysis and control algorithm are presented and validated during both starting and load transient conditions by means of simulation results. …”
  17. 17
  18. 18
  19. 19

    Enhancing fairness and scalability in IOTA tangle networks: a POMDP-based tip selection algorithm for decentralized systems by Mays Alshaikhli (22564811)

    Published 2025
    “…This algorithm offers significant scalability, fairness, and adaptability, making it a robust solution for IoT-based decentralized applications. …”
  20. 20

    Real-Time Performance Evaluation of a Genetic Algorithm Based Fuzzy Logic Controller for IPM Motor Drives by Nasir Uddin, M.

    Published 2005
    “…The proposed GFLC is developed to have less computational burden, which makes it suitable for real-time implementation. The parameters for the GFLC are tuned by genetic algorithm (GA). …”
    Get full text
    article