يعرض 161 - 180 نتائج من 263 نتيجة بحث عن '(((( data scheduling algorithm ) OR ( data testing algorithm ))) OR ( elements method algorithm ))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 161

    ISSP حسب Zouein, P.P.

    منشور في 2017
    "…Many decision-support tools were developed to assist planners in space scheduling but these were limited to providing the user with a platform that ties spatial and temporal data in the project and left it up to the user to decide on positions of resources and schedule adjustments to solve spatial conflicts that may arise in the process of constructing site layouts over time.The ISSP system, presented here, provides a graphical user-interactive interface with underlying layout and scheduling algorithms that construct feasible layout and schedule solutions under 2-dimensional spatial constraints between resources. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  2. 162
  3. 163

    A geometric-primitives-based compression scheme for testingsystems-on-a-chip حسب El-Maleh, A.

    منشور في 2001
    "…In this paper, it is assumed that an embedded core will be used to execute the decompression algorithm and decompress the test data…"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 164

    A modified coronavirus herd immunity optimizer for capacitated vehicle routing problem حسب Abu Zitar, Raed

    منشور في 2021
    "…Moreover, the results achieved by modified CHIOare compared against the results of other 13 well-regarded algorithms. For the first data set, the modifiedCHIO is able to gain the same results as the other comparative methods in two out of ten instances andacceptable results in the rest. …"
    احصل على النص الكامل
  5. 165

    Applications of fast fourier transform in the integrity evaluation of deep foundations حسب Abi Shdid, Caesar

    منشور في 2016
    "…The method is developed and validated using experimental data, and is based on applying the fast Fourier transform mapping algorithm on data obtained from cross-hole sonic logging. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 166

    FoGMatch حسب Arisdakessian, Sarhad

    منشور في 2019
    "…Simulation results reveal that our solution outperforms the two common scheduling algorithms (i.e., Min-Min and Max-Min) in terms of IoT services execution makespan, fog nodes resource utilization efficiency and execution time.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  7. 167

    A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security حسب S. Shitharth (12017480)

    منشور في 2023
    "…Here, the Quantized Identical Data Imputation (QIDI) mechanism is implemented at first for data preprocessing and normalization. …"
  8. 168

    Modelling Exchange Rates during Currency Crisis using Neural Networks حسب Nasr, G. E.

    منشور في 2006
    "…The models are built using the feedforward ANN structure trained by the backpropagation algorithm. Exchange rate data from the Lebanese currency crisis period of 1985-1992 is used for training, testing and evaluation of the models. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  9. 169
  10. 170

    Decomposition-based wind power forecasting models and their boundary issue: An in-depth review and comprehensive discussion on potential solutions حسب Yinsong Chen (16685508)

    منشور في 2022
    "…These methods generally disaggregate the original time series data into sub-time-series with better stationarity, and then the target data is predicted based on the sub-series. …"
  11. 171
  12. 172

    Uplink Noma in UAV-Assisted IoT Networks حسب Mrad, Ali

    منشور في 2022
    "…The first part of the thesis considers the problem of data collection from time-constrained IoT devices through deploying a UAV with uplink NOMA. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  13. 173

    Dataset built for Arabic Sentiment Analysis حسب AL MUKHAITI, AYESHA JUMAA SALEM

    منشور في 2016
    "…Key stages of the framework takes three dimensions. We followed an Algorithm which involves Data Acquisition stage, Filtering Stage and Annotation Stage. …"
    احصل على النص الكامل
  14. 174

    I Will Survive: An Event-driven Conformance Checking Approach Over Process Streams حسب Raun, Kristo

    منشور في 2023
    "…This paper introduces a new approximate algorithm – I Will Survive (IWS). The algorithm utilizes the trie data structure to improve the calculation speed, while remaining memory-efficient. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
  15. 175

    An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation حسب El-Maleh, Aiman H.

    منشور في 2001
    "…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
    احصل على النص الكامل
    article
  16. 176

    An evolutionary meta-heuristic for state justification insequential automatic test pattern generation حسب El-Maleh, A.H.

    منشور في 2001
    "…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 177
  18. 178
  19. 179

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology حسب Al-Hemairy, Moh'd Hussain

    منشور في 2010
    "…Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
    احصل على النص الكامل
  20. 180

    Approximate XML structure validation based on document–grammar tree similarity حسب Tekli, Joe

    منشور في 2015
    "…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article