يعرض 1 - 20 نتائج من 27 نتيجة بحث عن '(( tolerant control algorithm ) OR ((( current mining algorithm ) OR ( neural coding algorithm ))))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 1

    Adaptive Fault-Tolerant Communication Based-Control for Parallel Connected Rectifiers حسب Ali Sharida (17947847)

    منشور في 2023
    "…<p dir="ltr">This article proposes an adaptive and fault-tolerant communication method for controlling parallel-connected active front-end rectifiers (AFRs). …"
  2. 2
  3. 3

    Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers حسب Ali Sharida (17947847)

    منشور في 2023
    "…<p dir="ltr">This article proposes a digital twin (DT)-based diagnosis and fault-tolerant control for T-type three-level rectifiers. …"
  4. 4

    Learning control algorithms for tracking "slowly" varying trajectories حسب Saab, Samer S.

    منشور في 1997
    "…However, in practice we desire to stop the process after a minimum number of iterations such that the trajectory errors are less than a desired tolerance bound. We present a methodology which is devoted to alleviate the difficulty of determining a priori the controller parameters such that the speed of convergence is improved. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 5

    Fault Diagnosis Based Machine Learning and Fault Tolerant Control of Multicellular Converter Used in Photovoltaic Water Pumping System حسب B. Rouabah (17947820)

    منشور في 2023
    "…In this study, a photovoltaic water pumping system with two power converters, the first is used to extract the maximum power using the maximum power point tracking (MPPT) algorithm, and the second is a three-cell multicellular power converter used to control the DC motor with a submerged pump. …"
  6. 6
  7. 7
  8. 8
  9. 9

    Data mining approach to predict student's selection of program majors حسب SIDDARTHA, SHARMILA

    منشور في 2019
    "…The methodology used in this study is the systematic literature review to source, evaluate and synthesize current information in this domain and the CRISP-DM to deploy data mining activities. …"
    احصل على النص الكامل
  10. 10

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector حسب AL HAMMADI, SUMAYYA ABDULLA

    منشور في 2022
    "…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …"
    احصل على النص الكامل
  11. 11

    Customs Trade Facilitation and Compliance for Ecommerce using Blockchain and Data Mining حسب Alqaryouti, Omar

    منشور في 2021
    "…Additionally, the Cross Industry Standard Process for Data Mining (CRISP-DM) methodology is employed for modelling the two proposed clustering algorithms to identify transactional risks. …"
    احصل على النص الكامل
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Orthogonal Learning Rosenbrock’s Direct Rotation with the Gazelle Optimization Algorithm for Global Optimization حسب Abu Zitar, Raed

    منشور في 2022
    "…Nevertheless, the GOA is unsuitable for addressing multimodal, hybrid functions, and data mining problems. Therefore, the current paper proposes the orthogonal learning (OL) method with Rosenbrock’s direct rotation strategy to improve the GOA and sustain the solution variety (IGOA). …"
    احصل على النص الكامل
  17. 17

    Sentiment analysis for Arabizi in social media. (c2015) حسب Tobaili, Taha

    منشور في 2015
    "…Most sentiment analysis research and progress is currently conducted in formal English. One major challenge is applying sentiment analysis techniques onto other languages. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  18. 18

    A heuristics for HTTP traffic identification in measuring user dissimilarity حسب Adeyemi R. Ikuesan (14157123)

    منشور في 2020
    "…The study utilizes HTTP request method of GET filtering, to develop a heuristic algorithm to identify user-initiated requests. The algorithm was experimentally tested on a group of users, to ascertain the certainty of identifying user-initiated requests. …"
  19. 19
  20. 20