بدائل البحث:
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
each algorithm » search algorithm (توسيع البحث), jaya algorithm (توسيع البحث)
implement » implemented (توسيع البحث), implementing (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
each algorithm » search algorithm (توسيع البحث), jaya algorithm (توسيع البحث)
implement » implemented (توسيع البحث), implementing (توسيع البحث)
-
121
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
منشور في 2015"…All the approach components and algorithms realizing the proposed analysis semantics have been implemented in one development framework. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
122
-
123
Dynamic multiple node failure recovery in distributed storage systems
منشور في 2018"…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
124
Face Flow: Constrained Optical Flow Framework for Faces
منشور في 2020احصل على النص الكامل
doctoralThesis -
125
New aspect-oriented constructs for security hardening concerns
منشور في 2009"…Moreover, we show the viability and correctness of the proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the result of explanatory case studies.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
126
Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité
منشور في 2009"…Moreover, we show the viability and correctness of our proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the results of explanatory case studies.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
127
A Cyber-Physical System and Graph-Based Approach for Transportation Management in Smart Cities
منشور في 2021"…The system makes use of travel-time, traffic intensity, vehicle’s speed, and current road conditions to construct a weighted city graph representing the road network. Traditional graph algorithms with efficient implementation technologies are employed to respond to commuters’ and authorities’ needs in order to achieve a smart and optimum transportation system. …"
-
128
-
129
-
130
Design and analysis of efficient and secure elliptic curve cryptoprocessors.
منشور في 2006"…The proposed architectures have been modeled using VHDL and implemented on FPGA platform.…"
احصل على النص الكامل
masterThesis -
131
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
منشور في 2017"…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
132
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
منشور في 2017"…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
133
Advancing Coherent Power Grid Partitioning: A Review Embracing Machine and Deep Learning
منشور في 2025"…This paper provides PS researchers with a bird’s eye view of the current state of mainstream PGP implementations. Additionally, it assists stakeholders in selecting the most appropriate clustering algorithms for PGP applications.…"
-
134
Modélisation et validation des modèles de véhicules hybrides
منشور في 2009"…L'effet des auxiliaires et de l'attitude du conducteur sur la consommation sont étudiés. Une stratégie de contrôle prédictive pour le GMP THS-II est également élaborée par programmation dynamique (DP), afin d'optimiser la consommation sur une route spécifiée au lieu d'une optimisation instantanée telle la stratégie RB, et d'accélérer le temps de calcul de l'algorithme DP pour faciliter son implémentation au sein du véhicule pour des applications temps réel. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
135
Enhancing building sustainability: A Digital Twin approach to energy efficiency and occupancy monitoring
منشور في 2024"…This system was rigorously tested in a controlled laboratory environment with multiple users, simulating diverse household scenarios. …"