يعرض 241 - 260 نتائج من 431 نتيجة بحث عن '(((( implementing based algorithm ) OR ( elements rd algorithm ))) OR ( levels using algorithm ))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 241
  2. 242
  3. 243

    MoveSchedule حسب Zouein, Pierette

    منشور في 1995
    "…The layout construction algorithm that underlies MoveSchedule uses Constraint Satisfaction to find the set of all positions that meet the constraints on resources' positions and Linear Programming to find the optimal positions that minimize resource transportation and relocation costs. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  4. 244

    Mechanical perturbation control of cardiac alternans حسب Hazim, Azzam

    منشور في 2018
    "…We analyze the effects of mechanical perturbation on the dynamics of amap model that couples themembrane voltage and active tension systems at the cellular level. Therefore, a two-dimensional iterative map of the heart beat-to-beat dynamics is introduced, and a stability analysis of the system of coupled maps is performed in the presence of a mechanical perturbation algorithm. …"
    احصل على النص الكامل
    article
  5. 245
  6. 246

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures حسب JUMA, MAZEN GHAZI

    منشور في 2021
    "…The technology stack was also enhanced with three new algorithms and five protocols. The proposed solution was optimized using the iterative four-objective cycle based on previous primary phase results. …"
    احصل على النص الكامل
  7. 247
  8. 248
  9. 249

    An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System حسب Alkhatib, Osama

    منشور في 2019
    "…Therefore, for this paper multiple machine learning algorithms are investigated to predict system failure based on vehicle trips information as well as maintenance management historical data including preventive maintenance and corrective maintenance. …"
    احصل على النص الكامل
  10. 250

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura, Habiba

    منشور في 2023
    "…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 251

    Exploring the System Dynamics of Covid-19 in Emergency Medical Services حسب Ali, Muhammad

    منشور في 2022
    "…The predictive analysis yielded a model of response times for emergency missions through machine learning, specifically using a random forest algorithm. The value in building a predictive model of response time lies in identifying the most influential predictors of response times such as team utilization, case severity, COVID-19 patients, and roadway distance. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  12. 252
  13. 253

    Turbo-charging dominating set with an FPT subroutine حسب Abu-Khzam, Faisal N.

    منشور في 2017
    "…Turbo-charging is a recent algorithmic technique that is based on the fixed-parameter tractability of the dynamic versions of some problems as a way to improve heuristics. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  14. 254
  15. 255

    Computation of conformal invariants حسب Mohamed M.S., Nasser

    منشور في 2020
    "…The method we use is based on the boundary integral equation method developed and implemented in [1]. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 256

    Edge intelligence for network intrusion prevention in IoT ecosystem حسب Mansura Habiba (17808302)

    منشور في 2023
    "…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …"
  17. 257

    A standalone RFID indoor positioning system using passive tags حسب Saab, Samer S.

    منشور في 2011
    "…Based on the location estimate, an iterative procedure is implemented, targeting the estimation of the tag-reader angle-path loss, where the latter is iteratively compensated from the received signal strength information measurement. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  18. 258

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology حسب Al-Hemairy, Moh'd Hussain

    منشور في 2010
    "…In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based on the surprising experimental results done by a previous study in the security lab which proposed an optimal algorithm to enhance their ability against the two famous network attacks; we implemented the proposed algorithm by this study and stimulate the experiment in order to test the algorithm performance. …"
    احصل على النص الكامل
  19. 259

    XBeGene: Scalable XML Documents Generator by Example Based on Real Data حسب Harazaki, Manami

    منشور في 2012
    "…Tools for generating synthetic XML documents underline an alternative solution, promoting flexibility and adaptability in generating synthetic document collections. Nonetheless, the usefulness of existing XML generators remains rather limited due to the restricted levels of expressiveness allowed to users. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  20. 260