بدائل البحث:
testing algorithm » cosine algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
data scheduling » task scheduling (توسيع البحث), ahead scheduling (توسيع البحث)
data testing » data using (توسيع البحث)
testing algorithm » cosine algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
data scheduling » task scheduling (توسيع البحث), ahead scheduling (توسيع البحث)
data testing » data using (توسيع البحث)
-
161
ISSP
منشور في 2017"…Many decision-support tools were developed to assist planners in space scheduling but these were limited to providing the user with a platform that ties spatial and temporal data in the project and left it up to the user to decide on positions of resources and schedule adjustments to solve spatial conflicts that may arise in the process of constructing site layouts over time.The ISSP system, presented here, provides a graphical user-interactive interface with underlying layout and scheduling algorithms that construct feasible layout and schedule solutions under 2-dimensional spatial constraints between resources. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
162
Assigning proctors to exams using scatter search. (c2006)
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
masterThesis -
163
A geometric-primitives-based compression scheme for testingsystems-on-a-chip
منشور في 2001"…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data…"
احصل على النص الكامل
احصل على النص الكامل
article -
164
A modified coronavirus herd immunity optimizer for capacitated vehicle routing problem
منشور في 2021"…Moreover, the results achieved by modified CHIOare compared against the results of other 13 well-regarded algorithms. For the first data set, the modifiedCHIO is able to gain the same results as the other comparative methods in two out of ten instances andacceptable results in the rest. …"
احصل على النص الكامل
-
165
Applications of fast fourier transform in the integrity evaluation of deep foundations
منشور في 2016"…The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
166
FoGMatch
منشور في 2019"…Simulation results reveal that our solution outperforms the two common scheduling algorithms (i.e., Min-Min and Max-Min) in terms of IoT services execution makespan, fog nodes resource utilization efficiency and execution time.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
167
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
منشور في 2023"…Here, the Quantized Identical Data Imputation (QIDI) mechanism is implemented at first for data preprocessing and normalization. …"
-
168
Modelling Exchange Rates during Currency Crisis using Neural Networks
منشور في 2006"…The models are built using the feedforward ANN structure trained by the backpropagation algorithm. Exchange rate data from the Lebanese currency crisis period of 1985-1992 is used for training, testing and evaluation of the models. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
169
-
170
Decomposition-based wind power forecasting models and their boundary issue: An in-depth review and comprehensive discussion on potential solutions
منشور في 2022"…These methods generally disaggregate the original time series data into sub-time-series with better stationarity, and then the target data is predicted based on the sub-series. …"
-
171
Machine Learning-Based Approach for EV Charging Behavior
منشور في 2021احصل على النص الكامل
doctoralThesis -
172
Uplink Noma in UAV-Assisted IoT Networks
منشور في 2022"…The first part of the thesis considers the problem of data collection from time-constrained IoT devices through deploying a UAV with uplink NOMA. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
173
Dataset built for Arabic Sentiment Analysis
منشور في 2016"…Key stages of the framework takes three dimensions. We followed an Algorithm which involves Data Acquisition stage, Filtering Stage and Annotation Stage. …"
احصل على النص الكامل
-
174
I Will Survive: An Event-driven Conformance Checking Approach Over Process Streams
منشور في 2023"…This paper introduces a new approximate algorithm – I Will Survive (IWS). The algorithm utilizes the trie data structure to improve the calculation speed, while remaining memory-efficient. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
175
An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation
منشور في 2001"…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
احصل على النص الكامل
article -
176
An evolutionary meta-heuristic for state justification insequential automatic test pattern generation
منشور في 2001"…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
احصل على النص الكامل
احصل على النص الكامل
article -
177
A Navigation and Control System for a Robot in Indoor/Outdoor Environments
منشور في 2016احصل على النص الكامل
doctoralThesis -
178
-
179
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
منشور في 2010"…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
احصل على النص الكامل
-
180
Approximate XML structure validation based on document–grammar tree similarity
منشور في 2015"…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article