Showing 1 - 20 results of 850 for search '(( significant systems based ) OR ( significant ((teer decrease) OR (nn decrease)) ))', query time: 0.11s Refine Results
  1. 1
  2. 2

    Detection of statistically significant network changes in complex biological networks by Raghvendra Mall (581171)

    Published 2017
    “…</p><h3>Methods</h3><p dir="ltr">In this paper, we propose an improvement over the state-of-the-art based on the Generalized Hamming Distance adopted for evaluating the topological difference between two networks and estimating its statistical significance. …”
  3. 3

    A genetic-based fuzzy logic power system stabilizer formultimachine power systems by Abido, M.A.

    Published 1997
    “…This paper presents a novel approach to combine genetic algorithms (GA) with fuzzy logic systems to design a genetic-based fuzzy logic power system stabilizer (GFLPSS) for multimachine power systems. …”
    Get full text
    Get full text
    article
  4. 4

    Hybridizing rule-based power system stabilizers with geneticalgorithms by Abido, M.A.

    Published 1999
    “…A hybrid genetic rule-based power system stabilizer (GRBPSS) is presented in this paper. …”
    Get full text
    Get full text
    article
  5. 5
  6. 6

    Reinforcement Learning Based EV Charging Management Systems–A Review by Heba M. Abdullah (16896384)

    Published 2021
    “…Unlike other machine learning approaches, the RL technique is based on maximizing the cumulative reward. This article reviews the existing literature related to the RL-based framework, objectives, and architecture for the charging coordination strategies of electric vehicles in the power systems. …”
  7. 7

    Model Based Adaptive Tracking Scheme For Unknown MIMO Bilinear Systems by Azhar, ASS

    Published 2020
    “…Bilinear systems are attractive candidates for many dynamical processes, since they allow a significantly larger class of behaviour than linear systems, yet retain a rich theory which is closely related to the familiar theory of linear systems. …”
    Get full text
    article
  8. 8

    Students’ perceptions of Kahoot!: An exploratory mixed-method study in EFL undergraduate classrooms in the UAE by Alawadhi, Azza

    Published 2021
    “…In recent years, game-based student response systems (GSRS) such as Socrative, Quizlet, and Kahoot! …”
    Get full text
    Get full text
  9. 9
  10. 10

    Modified Elite Opposition-Based Artificial Hummingbird Algorithm for Designing FOPID Controlled Cruise Control System by Abualigah, Laith

    Published 2023
    “…Our approach outperforms existing optimization techniques on benchmark functions, and we demonstrate its effectiveness in controlling cruise control systems with increased flexibility and precision. …”
    Get full text
  11. 11
  12. 12

    The reasons behind the non-application of the activity based costing system in the service industry in Lebanon. (c2015) by Dandach, Ghiwa Ali

    Published 2015
    “…The Activity Based Costing (ABC) system, despite its spread in the First World Countries and the recognition of its importance also in the third world countries, is not adopted in the service industry in Lebanon while costing output. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  13. 13

    Hybrid deep learning based threat intelligence framework for Industrial IoT systems by Jahanzaib Malik (23718816)

    Published 2025
    “…The proposed approach was also compared against several contemporary deep learning-based architectures and existing benchmark algorithms. …”
  14. 14

    U-model Based Adaptive Tracking Scheme for Unknown MIMO Bilinear Systems by Azhar, A.S.S.

    Published 2006
    “…Bilinear systems are attractive candidates for many dynamical processes, since they allow a significantly larger class of behaviour than linear systems, yet retain a rich theory which is closely related to the familiar theory of linear systems. …”
    Get full text
    Get full text
    article
  15. 15

    U-Model Based Adaptive Tracking Scheme For Unknown MIMO Bilinear Systems by Azhar, ASS

    Published 2020
    “…Bilinear systems are attractive candidates for many dynamical processes, since they allow a significantly larger class of behaviour than linear systems, yet retain a rich theory which is closely related to the familiar theory of linear systems. …”
    Get full text
    article
  16. 16

    U-Model Based Adaptive Tracking Scheme For Unknown MIMO Bilinear Systems by Azhar, ASS

    Published 2020
    “…Bilinear systems are attractive candidates for many dynamical processes, since they allow a significantly larger class of behaviour than linear systems, yet retain a rich theory which is closely related to the familiar theory of linear systems. …”
    Get full text
    article
  17. 17

    U-Model Based Adaptive Tracking Scheme For Unknown MIMO Bilinear Systems by Azhar, ASS

    Published 2020
    “…Bilinear systems are attractive candidates for many dynamical processes, since they allow a significantly larger class of behaviour than linear systems, yet retain a rich theory which is closely related to the familiar theory of linear systems. …”
    Get full text
    article
  18. 18

    Topology and parameter estimation in power systems through inverter-based broadband stimulations by Margossian, Harag

    Published 2015
    “…This phenomenon coupled with the adoption of open energy markets has significantly complicated the power-flows on the power networks, requiring advanced and intelligent parameter knowledge to optimise the efficiency, quality and reliability of the system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  19. 19
  20. 20

    Beyond vanilla: Improved autoencoder-based ensemble in-vehicle intrusion detection system by Sampath Rajapaksha (17541411)

    Published 2023
    “…Detecting attacks on the CAN bus, particularly masquerade attacks, presents significant challenges. It necessitates an intrusion detection system (IDS) that effectively utilizes both CAN ID and payload data to ensure thorough detection and protection against a wide range of attacks, all while operating within the constraints of limited computing resources. …”