Showing 41 - 60 results of 202 for search '(((( complex system algorithm ) OR ( element making algorithm ))) OR ( level coding algorithm ))', query time: 0.13s Refine Results
  1. 41

    A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks by Saad, Walid

    Published 2012
    “…While most existing literature focuses on downlink-only or uplink-only scheduling algorithms, the proposed algorithm aims at ensuring a utility function that jointly captures the quality of service in terms of delay and channel quality on both links. …”
    Get full text
    Get full text
    Get full text
    article
  2. 42

    Improved Jaya Synergistic Swarm Optimization Algorithm to Optimize Task Scheduling Problems in Cloud Computing by Abualigah, Laith

    Published 2024
    “…One critical aspect of cloud computing is efficient task scheduling, which directly impacts system performance and resource utilization. In this paper, we propose an enhanced optimization algorithm tailored for task scheduling in cloud environments. …”
    Get full text
  3. 43
  4. 44
  5. 45

    A heuristics for HTTP traffic identification in measuring user dissimilarity by Adeyemi R. Ikuesan (14157123)

    Published 2020
    “…This study reveals that, with the current complex nature of Internet and HTTP traffic, browser complexity, dynamic web programming structure, the surge in network delay, and unstable user behavior in network interaction, user-initiated requests can be accurately determined. …”
  6. 46
  7. 47
  8. 48
  9. 49

    Properties of Unique Degree Sequences of 3-Uniform Hypergraphs by Tarsissi, Lama

    Published 2021
    “…The existence of this hypergraph makes us conjecture an extended generating algorithm for the sequences of Deza et al. to include a much wider class of unique 3-uniform hypergraphs. …”
    Get full text
  10. 50
  11. 51

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts by ALSHAMSI, SUROUR

    Published 2022
    “…It is difficult to have efficient detection systems to precisely separate normal behavior from malicious behavior, based on the analysis of network traffic. …”
    Get full text
  12. 52

    Predicting stability of classes in an object-oriented system by Azar, D.

    Published 2010
    “…In this paper, we present a heuristic approach that relies on the adaptation and recombination of already built predictive models to new unseen software.The predictive models are all rule-based models and the approach is tested on the stability of classes in an object-oriented software system. We compare our results to the machine learning algorithm C4.5, and we show that our approach out-beats it.…”
    Get full text
    Get full text
    Get full text
    article
  13. 53

    Hardware Model of an Expandable RSA Cryptographic System by Gutub, Adnan

    Published 1998
    “…One of the most popular cryptographic systems is the RSA system. The security of the RSA-encrypted information largely depends on the size of the used encryption key. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  14. 54

    Robust tuning of power system stabilizers in multimachine powersystems by Abdel-Magid, Y.L.

    Published 2000
    “…The problem of selecting the stabilizer parameters is converted to a simple optimization problem with an eigenvalue-based objective function, which is solved by a tabu search algorithm. The objective function allows the selection of the stabilizer parameters to optimally place the closed-loop eigenvalues in the left-hand side of a vertical line in the complex s-plane. …”
    Get full text
    Get full text
    article
  15. 55

    Reinforcement Learning-Based School Energy Management System by Yassine Chemingui (18891757)

    Published 2020
    “…Conventional Building Energy Management methods suffer from a high dimensional and complex control environment. In recent years, the Deep Reinforcement Learning algorithm, applying neural networks for function approximation, shows promising results in handling such complex problems. …”
  16. 56

    Sensitivity analysis and genetic algorithm-based shear capacity model for basalt FRC one-way slabs reinforced with BFRP bars by Abathar Al-Hamrani (16494884)

    Published 2023
    “…Finally, a design equation that can predict the shear capacity of one-way BFRC-BFRP slabs was proposed based on genetic algorithm. The proposed model showed the best prediction accuracy compared to the available design codes and guidelines with a mean of predicted to experimental shear capacities (V<sub>pred</sub>/V<sub>exp</sub>) ratio of 0.97 and a coefficient of variation of 17.91%.…”
  17. 57

    A Hardware Model of an Expandable RSA Cryptogrsphic System by Gutub, Adnan

    Published 1998
    “…One of the most popular cryptographic systems is the RSA system. The security of the RSA-encrypted information largely depends on the size of the used encryption key. …”
    Get full text
    masterThesis
  18. 58

    Estimation of the methanol loss in the gas hydrate prevention unit using the artificial neural networks: Investigating the effect of training algorithm on the model accuracy by Haitao Xu (435549)

    Published 2023
    “…The complex gas hydrate prevention unit is simulated using the MLPNN model trained by 20 different optimization algorithms. …”
  19. 59
  20. 60

    Power system output feedback stabilizer design via geneticalgorithms by Abdel-Magid, Y.L.

    Published 1997
    “…The paper demonstrates the use of genetic algorithms to design output feedback power system stabilizers. …”
    Get full text
    Get full text
    article