بدائل البحث:
implementing control » implementing iot (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
ii algorithm » rd algorithm (توسيع البحث), _ algorithms (توسيع البحث)
elements ii » elements _ (توسيع البحث)
implementing control » implementing iot (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
ii algorithm » rd algorithm (توسيع البحث), _ algorithms (توسيع البحث)
elements ii » elements _ (توسيع البحث)
-
161
-
162
Dynamic multiple node failure recovery in distributed storage systems
منشور في 2018"…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
163
A Cyber-Physical System and Graph-Based Approach for Transportation Management in Smart Cities
منشور في 2021"…The system makes use of travel-time, traffic intensity, vehicle’s speed, and current road conditions to construct a weighted city graph representing the road network. Traditional graph algorithms with efficient implementation technologies are employed to respond to commuters’ and authorities’ needs in order to achieve a smart and optimum transportation system. …"
-
164
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
منشور في 2022"…The findings from this study will help implement a system that will significantly reduce fraud in the procurement sector. …"
احصل على النص الكامل
-
165
Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates
منشور في 2022"…<h2>Purpose</h2> <p>We present an approach that combines finite element analysis and genetic algorithms to find the optimal configuration of local resonators created in the host structure to suppress their vibration in a target low-frequency range. …"
-
166
-
167
-
168
Design and analysis of efficient and secure elliptic curve cryptoprocessors.
منشور في 2006"…Parallelism and randomization are controlled at different levels to provide more efficiency and security. …"
احصل على النص الكامل
masterThesis -
169
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
منشور في 2017"…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
170
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
منشور في 2017"…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
171
-
172
Face Flow: Constrained Optical Flow Framework for Faces
منشور في 2020احصل على النص الكامل
doctoralThesis -
173
Advancing Coherent Power Grid Partitioning: A Review Embracing Machine and Deep Learning
منشور في 2025"…This paper provides PS researchers with a bird’s eye view of the current state of mainstream PGP implementations. Additionally, it assists stakeholders in selecting the most appropriate clustering algorithms for PGP applications.…"
-
174
FPGA-Based Network Traffic Classification Using Machine Learning
منشور في 2019احصل على النص الكامل
doctoralThesis -
175
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
منشور في 2024"…As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. There are many machine-learning and deep-learning algorithms have been developed by researchers. …"
-
176
Modélisation et validation des modèles de véhicules hybrides
منشور في 2009"…L'effet des auxiliaires et de l'attitude du conducteur sur la consommation sont étudiés. Une stratégie de contrôle prédictive pour le GMP THS-II est également élaborée par programmation dynamique (DP), afin d'optimiser la consommation sur une route spécifiée au lieu d'une optimisation instantanée telle la stratégie RB, et d'accélérer le temps de calcul de l'algorithme DP pour faciliter son implémentation au sein du véhicule pour des applications temps réel. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
177
Enhancing building sustainability: A Digital Twin approach to energy efficiency and occupancy monitoring
منشور في 2024"…This system was rigorously tested in a controlled laboratory environment with multiple users, simulating diverse household scenarios. …"