يعرض 281 - 300 نتائج من 300 نتيجة بحث عن '(((( data backing algorithm ) OR ( solved using algorithm ))) OR ( element method algorithm ))*', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 281
  2. 282
  3. 283

    The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions حسب Abdulmalik Alwarafy (17984104)

    منشور في 2022
    "…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …"
  4. 284

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying حسب Tekli, Joe

    منشور في 2023
    "…In this paper, we describe a new approach for XML keyword search aiming to solve the limitations mentioned above. Our solution first transforms the XML document collection (offline) and the keyword query (on-the-fly) into meaningful semantic representations using context-based and global disambiguation methods, specially designed to allow almost linear computation efficiency. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  5. 285

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…Its security has been verified formally using Random Oracle Model (ROM), ProVerif2.02 and informally using assumptions and pragmatic illustration. …"
  6. 286

    Dynamic single node failure recovery in distributed storage systems حسب Itani, M.

    منشور في 2017
    "…To minimize the system repair cost, we formulate our problem using incidence matrices and solve it heuristically using genetic algorithms for all possible cases of single node failures. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 287

    Using artificial bee colony to optimize software quality estimation models. (c2015) حسب Abou Assi, Tatiana Antoine

    منشور في 2016
    "…We compare our models to others constructed using other well established techniques such as C4.5, Genetic Algorithms, Simulated Annealing, Tabu Search, multi-layer perceptron with back-propagation, multi-layer perceptron hybridized with ABC and the majority classifier. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  8. 288

    Modelling of pollutant transport in compound open channels حسب Chatila, Jean Georges

    منشور في 1998
    "…Longitudinal and transverse mixing coefficients were calculated using the method of moments and by estimation using empirical relationships. …"
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  9. 289

    Reliability and fault tolerance based topological optimization of computer networks - part II: iterative techniques حسب Abd-El-Barr, Mostafa

    منشور في 2003
    "…We consider fault-tolerance to be an important network design aspect. We consider the use of three iterative techniques, namely tabu search, simulated annealing, and genetic algorithms, in solving the multiobjective topological optimization network design problem. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 290

    Optimal Trajectory and Positioning of UAVs for Small Cell HetNets: Geometrical Analysis and Reinforcement Learning Approach حسب Mohammad Taghi Dabiri (16904658)

    منشور في 2023
    "…We then formulate the problem for UAV trajectory to minimize the maximum outage probability (OP) of directional THz links. Then, using geometrical analysis and deep reinforcement learning (RL) method, we propose several algorithms to find the optimal trajectory and select an optimal pattern during the trajectory. …"
  11. 291

    ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks حسب Muhammad Asif Khan (7367468)

    منشور في 2022
    "…Recently, cognitive network architectures using sophisticated learning techniques are increasingly being applied to such problems. …"
  12. 292

    DASSI: differential architecture search for splice identification from DNA sequences حسب Shabir Moosa (14153316)

    منشور في 2022
    "…<h2>Background</h2> <p>The data explosion caused by unprecedented advancements in the field of genomics is constantly challenging the conventional methods used in the interpretation of the human genome. The demand for robust algorithms over the recent years has brought huge success in the field of Deep Learning (DL) in solving many difficult tasks in image, speech and natural language processing by automating the manual process of architecture design. …"
  13. 293
  14. 294
  15. 295

    Industrial Internet of Things enabled technologies, challenges, and future directions حسب Shams Forruque, Ahmed

    منشور في 2023
    "…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 296
  17. 297
  18. 298

    Scatter search technique for exam timetabling حسب Mansour, Nashat

    منشور في 2011
    "…These constraints are conflicting, which makes exam timetabling intractable. Hence, solving this problem in realistic time requires the use of heuristic approaches. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  19. 299

    Industrial Internet of Things enabled technologies, challenges, and future directions حسب Shams Forruque Ahmed (16517712)

    منشور في 2023
    "…This paper explores IIoT-enabled technologies and infrastructure, their role in global industrial growth, applications, challenges, and future directions. IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. …"
  20. 300