بدائل البحث:
modeling algorithm » scheduling algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
fluent modeling » agent modeling (توسيع البحث), event modeling (توسيع البحث)
modeling algorithm » scheduling algorithm (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
fluent modeling » agent modeling (توسيع البحث), event modeling (توسيع البحث)
-
121
On the parameterized parallel complexity and the vertex cover problem
منشور في 2016"…In particular, we present a parallel algorithm that outperforms the best known parallel algorithm for this problem: using O(m) instead of O(n2) parallel processors, the running time improves from 4logn+O(kk) to O(k⋅log3n) , where m is the number of edges, n is the number of vertices of the input graph, and k is an upper bound of the size of the sought vertex cover. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
122
Validation of plasma protein glycation and oxidation biomarkers for the diagnosis of autism
منشور في 2023"…The test had 88% accuracy in children 5–12 years old. Herein, we present an international multicenter clinical validation study (N = 478) with application of similar biomarkers to a wider age range of 1.5–12 years old children. …"
-
123
On Single Source Reachability Improvement
منشور في 2022"…We show the NP hardness and present an effective polynomial-time greedy algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
124
Autonomous Vehicles Delivery Systems: Analyzing Vehicle Routing Problems with a Moving Depot
منشور في 2019احصل على النص الكامل
doctoralThesis -
125
A new estimator and approach for estimating the subpopulation parameters
منشور في 2021"…<p dir="ltr">Based on some theoretical results, we recommend a new algorithm for estimating the total and mean of a subpopulation variable for the case of a known subpopulation size, which is different from the algorithm recommended by most of sampling books. …"
-
126
An automated temporal partitioning and loop fission approach for FPGA based reconfigurable synthesis of DSP applications
منشور في 2017"…We discuss efficient memory mapping and address generation techniques for the synthesis of reconfigurable designs. A case study on the Joint Photographic Experts Group (JPEG) image compression algorithm demonstrates the effectiveness of our approach.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
127
A Blockchain Model for Secure Communications in Internet of Vehicles
منشور في 2021"…Secure data communication is vital to the success and stability of the IoV and should be integrated into its various operations and aspects. In this paper, we present a framework for secure IoV communications by utilizing the High Performance Blockchain Consensus (HPBC) algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
128
An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation
منشور في 2001"…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
احصل على النص الكامل
article -
129
An evolutionary meta-heuristic for state justification insequential automatic test pattern generation
منشور في 2001"…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
احصل على النص الكامل
احصل على النص الكامل
article -
130
Optimizing ADWIN for Steady Streams
منشور في 2022"…However, the drift detection accuracy of these variants was not compared with the original algorithm. Moreover, there is no study concerning the memory consumption of the variants and the origi nal algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
131
Solution of Fractional Differential Equations: Transform and Iterative Methods Approach
منشور في 2019احصل على النص الكامل
doctoralThesis -
132
Swarm intelligence-based hyper-heuristic for the vehicle routing problem with prioritized customers
منشور في 2020"…Various studies have been conducted regarding this topic; nevertheless, up to now, few studies used the Cuckoo Search-based hyper-heuristic. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
133
Auto Takeoff and Precision Landing using Integrated GPS/INS/Optical Flow Solution
منشور في 2015احصل على النص الكامل
doctoralThesis -
134
A microscale evaluation of pavement roughness effects for asset management
منشور في 2013"…A new low-cost and efficient technology is presented to measure and contrast vehicles' vertical accelerations over smooth and rough pavement sections. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
135
Approximate XML structure validation based on document–grammar tree similarity
منشور في 2015"…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
136
Corona power loss computation in bundled bipolar conductors
منشور في 2000"…In this paper, a finite element (FE) based algorithm devoted for the computation of the corona current and hence the corona power loss associated with bundled bipolar high voltage direct current (HVDC) conductors is presented. …"
احصل على النص الكامل
احصل على النص الكامل
article -
137
A feature‐based approach for guiding the selection of Internet of Things cybersecurity standards using text mining
منشور في 2021"…However, selecting relevant standards is not trivial and requires a broad understanding of cybersecurity and knowledge about the available standards. In this study, we present a systematic approach that guides IoT system developers in selecting relevant cybersecurity standards for their IoT projects. …"
-
138
Approximate XML structure validation technical report
منشور في 2014"…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
139
Regression testing C# programs. (c2007)
منشور في 2007احصل على النص الكامل
احصل على النص الكامل
masterThesis -
140
Oversampling techniques for imbalanced data in regression
منشور في 2024"…<p>Our study addresses the challenge of imbalanced regression data in Machine Learning (ML) by introducing tailored methods for different data structures. …"