Search alternatives:
implementing based » implementing bundled (Expand Search)
using algorithm » cosine algorithm (Expand Search)
deer algorithm » search algorithm (Expand Search)
elements deer » elementi per (Expand Search)
levels using » cells using (Expand Search)
Showing 241 - 260 results of 431 for search '(((( implementing based algorithm ) OR ( elements deer algorithm ))) OR ( levels using algorithm ))', query time: 0.10s Refine Results
  1. 241
  2. 242
  3. 243

    MoveSchedule by Zouein, Pierette

    Published 1995
    “…The layout construction algorithm that underlies MoveSchedule uses Constraint Satisfaction to find the set of all positions that meet the constraints on resources' positions and Linear Programming to find the optimal positions that minimize resource transportation and relocation costs. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  4. 244

    Mechanical perturbation control of cardiac alternans by Hazim, Azzam

    Published 2018
    “…We analyze the effects of mechanical perturbation on the dynamics of amap model that couples themembrane voltage and active tension systems at the cellular level. Therefore, a two-dimensional iterative map of the heart beat-to-beat dynamics is introduced, and a stability analysis of the system of coupled maps is performed in the presence of a mechanical perturbation algorithm. …”
    Get full text
    article
  5. 245
  6. 246

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures by JUMA, MAZEN GHAZI

    Published 2021
    “…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …”
    Get full text
  7. 247
  8. 248
  9. 249

    An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System by Alkhatib, Osama

    Published 2019
    “…Therefore, for this paper multiple machine learning algorithms are investigated to predict system failure based on vehicle trips information as well as maintenance management historical data including preventive maintenance and corrective maintenance. …”
    Get full text
  10. 250

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura, Habiba

    Published 2023
    “…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
    Get full text
    Get full text
    Get full text
    article
  11. 251

    Exploring the System Dynamics of Covid-19 in Emergency Medical Services by Ali, Muhammad

    Published 2022
    “…The predictive analysis yielded a model of response times for emergency missions through machine learning, specifically using a random forest algorithm. The value in building a predictive model of response time lies in identifying the most influential predictors of response times such as team utilization, case severity, COVID-19 patients, and roadway distance. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  12. 252
  13. 253

    Turbo-charging dominating set with an FPT subroutine by Abu-Khzam, Faisal N.

    Published 2017
    “…Turbo-charging is a recent algorithmic technique that is based on the fixed-parameter tractability of the dynamic versions of some problems as a way to improve heuristics. …”
    Get full text
    Get full text
    Get full text
    conferenceObject
  14. 254
  15. 255

    Computation of conformal invariants by Mohamed M.S., Nasser

    Published 2020
    “…The method we use is based on the boundary integral equation method developed and implemented in [1]. …”
    Get full text
    Get full text
    Get full text
    article
  16. 256

    Edge intelligence for network intrusion prevention in IoT ecosystem by Mansura Habiba (17808302)

    Published 2023
    “…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …”
  17. 257

    A standalone RFID indoor positioning system using passive tags by Saab, Samer S.

    Published 2011
    “…Based on the location estimate, an iterative procedure is implemented, targeting the estimation of the tag-reader angle-path loss, where the latter is iteratively compensated from the received signal strength information measurement. …”
    Get full text
    Get full text
    Get full text
    article
  18. 258

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology by Al-Hemairy, Moh'd Hussain

    Published 2010
    “…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …”
    Get full text
  19. 259

    XBeGene: Scalable XML Documents Generator by Example Based on Real Data by Harazaki, Manami

    Published 2012
    “…Tools for generating synthetic XML documents underline an alternative solution, promoting flexibility and adaptability in generating synthetic document collections. Nonetheless, the usefulness of existing XML generators remains rather limited due to the restricted levels of expressiveness allowed to users. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  20. 260