يعرض 181 - 200 نتائج من 204 نتيجة بحث عن '(((( data code algorithm ) OR ( a scheduling algorithm ))) OR ( elements network algorithm ))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 181
  2. 182

    Decomposition-based wind power forecasting models and their boundary issue: An in-depth review and comprehensive discussion on potential solutions حسب Yinsong Chen (16685508)

    منشور في 2022
    "…</p><h2>Other Information</h2> <p> Published in: Energy Reports<br> License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1016/j.egyr.2022.07.005" target="_blank">https://dx.doi.org/10.1016/j.egyr.2022.07.005</a></p>…"
  3. 183

    Making progress with the automation of systematic reviews: principles of the International Collaboration for the Automation of Systematic Reviews (ICASR) حسب Elaine Beller (44602)

    منشور في 2018
    "…Recent advances in natural language processing, text mining and machine learning have produced new algorithms that can accurately mimic human endeavour in systematic review activity, faster and more cheaply. …"
  4. 184
  5. 185

    Uplink Noma in UAV-Assisted IoT Networks حسب Mrad, Ali

    منشور في 2022
    "…The second device is then selected using a heuristic algorithm based on prioritizing devices with higher bit rate requirements and strict deadlines. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  6. 186

    Design and analysis of entropy-constrained reflected residual vector quantization حسب Mousa, W.A.H.

    منشور في 2002
    "…Jointly optimized RVQ (JORVQ) is an effective design algorithm for minimizing the overall quantization error. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 187

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD حسب Saeed Ullah Jan (9079260)

    منشور في 2021
    "…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …"
  8. 188

    Curriculum based course timetabling حسب Mansour, Nashat

    منشور في 2013
    "…Scheduling courses into predefined periods and rooms over a week with a given set of constraints is an NP-complete problem. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  9. 189

    Role of authentication factors in Fin-tech mobile transaction security حسب Habib Ullah Khan (12024579)

    منشور في 2023
    "…In addition, this also ensures the user is legitimate using advanced technologies and algorithms to predict and discover transaction risks and discourage fraudsters from trying.…"
  10. 190

    Developing an online hate classifier for multiple social media platforms حسب Joni Salminen (7434770)

    منشور في 2020
    "…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …"
  11. 191

    Economic Production Lot-Sizing For An Unreliable Machine Under Imperfect Age-Based Maintenance Policy حسب El-Ferik, S

    منشور في 2020
    "…In this work, we propose a model that could be used to determine the optimal number of production runs and the sequence of PM schedules that minimizes the long-term average cost. …"
    احصل على النص الكامل
    article
  12. 192
  13. 193
  14. 194
  15. 195
  16. 196
  17. 197

    Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study حسب Muhammad Atif Butt (10849980)

    منشور في 2023
    "…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …"
  18. 198
  19. 199

    An integrated partitioning and synthesis system for dynamically reconfigurable Multi-FPGA architectures حسب Ouaiss, Iyad

    منشور في 2017
    "…This paper presents an overview of SPARCS and the various algorithms used in the system, along with a brief description of how a JPEG-like image compression algorithm is mapped to a Multi-FPGA board using SPARCS.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  20. 200

    Big Data Energy Management, Analytics and Visualization for Residential Areas حسب Gupta, Ragini

    منشور في 2020
    "…Thus, the proposed work empowers home owners to manage their home appliances energy consumption and allow them to compare their consumption with respect to their local community total consumption. This serves as a nudge in consumer's behavior to schedule their home appliances operation according to their local community consumption profile and trend. …"
    احصل على النص الكامل
    article