يعرض 161 - 177 نتائج من 177 نتيجة بحث عن '(((( implementing control algorithm ) OR ( elements ii algorithm ))) OR ( level coding algorithm ))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 161
  2. 162

    Dynamic multiple node failure recovery in distributed storage systems حسب Itani, May

    منشور في 2018
    "…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  3. 163

    A Cyber-Physical System and Graph-Based Approach for Transportation Management in Smart Cities حسب Muhammad Mazhar Rathore (17051745)

    منشور في 2021
    "…The system makes use of travel-time, traffic intensity, vehicle’s speed, and current road conditions to construct a weighted city graph representing the road network. Traditional graph algorithms with efficient implementation technologies are employed to respond to commuters’ and authorities’ needs in order to achieve a smart and optimum transportation system. …"
  4. 164

    Use of Data Mining Techniques to Detect Fraud in Procurement Sector حسب AL HAMMADI, SUMAYYA ABDULLA

    منشور في 2022
    "…The findings from this study will help implement a system that will significantly reduce fraud in the procurement sector. …"
    احصل على النص الكامل
  5. 165

    Application of Metastructures for Targeted Low-Frequency Vibration Suppression in Plates حسب Ratiba F. Ghachi (14152455)

    منشور في 2022
    "…<h2>Purpose</h2> <p>We present an approach that combines finite element analysis and genetic algorithms to find the optimal configuration of local resonators created in the host structure to suppress their vibration in a target low-frequency range. …"
  6. 166
  7. 167
  8. 168

    Design and analysis of efficient and secure elliptic curve cryptoprocessors. حسب Al-Somani, Turki Faisal

    منشور في 2006
    "…Parallelism and randomization are controlled at different levels to provide more efficiency and security. …"
    احصل على النص الكامل
    masterThesis
  9. 169

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling حسب Armin, Amindari

    منشور في 2017
    "…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 170

    Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling حسب Amindari, Armin

    منشور في 2017
    "…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 171
  12. 172
  13. 173

    Advancing Coherent Power Grid Partitioning: A Review Embracing Machine and Deep Learning حسب Mohamed Massaoudi (16888710)

    منشور في 2025
    "…This paper provides PS researchers with a bird’s eye view of the current state of mainstream PGP implementations. Additionally, it assists stakeholders in selecting the most appropriate clustering algorithms for PGP applications.…"
  14. 174
  15. 175

    Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey حسب Faria Nawshin (21841598)

    منشور في 2024
    "…As new <u>malware</u> gets introduced frequently by <u>malware developers</u>, it is very challenging to come up with comprehensive algorithms to detect this malware. There are many machine-learning and deep-learning algorithms have been developed by researchers. …"
  16. 176

    Modélisation et validation des modèles de véhicules hybrides حسب Mansour, Charbel

    منشور في 2009
    "…L'effet des auxiliaires et de l'attitude du conducteur sur la consommation sont étudiés. Une stratégie de contrôle prédictive pour le GMP THS-II est également élaborée par programmation dynamique (DP), afin d'optimiser la consommation sur une route spécifiée au lieu d'une optimisation instantanée telle la stratégie RB, et d'accélérer le temps de calcul de l'algorithme DP pour faciliter son implémentation au sein du véhicule pour des applications temps réel. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  17. 177

    Enhancing building sustainability: A Digital Twin approach to energy efficiency and occupancy monitoring حسب Aya Nabil Sayed (17317006)

    منشور في 2024
    "…This system was rigorously tested in a controlled laboratory environment with multiple users, simulating diverse household scenarios. …"