بدائل البحث:
mining algorithm » cosine algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
tolerant » tolerance (توسيع البحث)
mining algorithm » cosine algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
tolerant » tolerance (توسيع البحث)
-
1
Adaptive Fault-Tolerant Communication Based-Control for Parallel Connected Rectifiers
منشور في 2023"…<p dir="ltr">This article proposes an adaptive and fault-tolerant communication method for controlling parallel-connected active front-end rectifiers (AFRs). …"
-
2
-
3
Digital-Twin-Based Diagnosis and Tolerant Control of T-Type Three-Level Rectifiers
منشور في 2023"…<p dir="ltr">This article proposes a digital twin (DT)-based diagnosis and fault-tolerant control for T-type three-level rectifiers. …"
-
4
Learning control algorithms for tracking "slowly" varying trajectories
منشور في 1997"…However, in practice we desire to stop the process after a minimum number of iterations such that the trajectory errors are less than a desired tolerance bound. We present a methodology which is devoted to alleviate the difficulty of determining a priori the controller parameters such that the speed of convergence is improved. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
5
Fault Diagnosis Based Machine Learning and Fault Tolerant Control of Multicellular Converter Used in Photovoltaic Water Pumping System
منشور في 2023"…In this study, a photovoltaic water pumping system with two power converters, the first is used to extract the maximum power using the maximum power point tracking (MPPT) algorithm, and the second is a three-cell multicellular power converter used to control the DC motor with a submerged pump. …"
-
6
CNN and HEVC Video Coding Features for Static Video Summarization
منشور في 2022احصل على النص الكامل
article -
7
-
8
-
9
Data mining approach to predict student's selection of program majors
منشور في 2019"…The methodology used in this study is the systematic literature review to source, evaluate and synthesize current information in this domain and the CRISP-DM to deploy data mining activities. …"
احصل على النص الكامل
-
10
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
منشور في 2022"…The method used in this research is a classification of models and algorithms used in data mining. All techniques also will be studied; they include clustering, tracking patterns, classifications and outlier detection. …"
احصل على النص الكامل
-
11
Customs Trade Facilitation and Compliance for Ecommerce using Blockchain and Data Mining
منشور في 2021"…Additionally, the Cross Industry Standard Process for Data Mining (CRISP-DM) methodology is employed for modelling the two proposed clustering algorithms to identify transactional risks. …"
احصل على النص الكامل
-
12
-
13
-
14
Automatic Video Summarization Using HEVC and CNN Features
منشور في 2022احصل على النص الكامل
doctoralThesis -
15
Comparative Study of Control Strategies for Under Actuated Manipulator
منشور في 2006احصل على النص الكامل
doctoralThesis -
16
Orthogonal Learning Rosenbrock’s Direct Rotation with the Gazelle Optimization Algorithm for Global Optimization
منشور في 2022"…Nevertheless, the GOA is unsuitable for addressing multimodal, hybrid functions, and data mining problems. Therefore, the current paper proposes the orthogonal learning (OL) method with Rosenbrock’s direct rotation strategy to improve the GOA and sustain the solution variety (IGOA). …"
احصل على النص الكامل
-
17
Sentiment analysis for Arabizi in social media. (c2015)
منشور في 2015"…Most sentiment analysis research and progress is currently conducted in formal English. One major challenge is applying sentiment analysis techniques onto other languages. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
18
A heuristics for HTTP traffic identification in measuring user dissimilarity
منشور في 2020"…The study utilizes HTTP request method of GET filtering, to develop a heuristic algorithm to identify user-initiated requests. The algorithm was experimentally tested on a group of users, to ascertain the certainty of identifying user-initiated requests. …"
-
19
-
20