يعرض 101 - 120 نتائج من 421 نتيجة بحث عن '(((( time processing algorithm ) OR ( element search algorithm ))) OR ( level using algorithm ))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 101

    Reinforcement R-learning model for time scheduling of on-demand fog placement حسب Farhat, Peter

    منشور في 2020
    "…We also demonstrate the ability of our model to improve over time by adapting the new demand of users. Experiments comparing the decisions of our model with two other potential fog placement approaches used for task/service scheduling (threshold based and random based) show that the number of processed requests performed by the cloud decreases from 100 to 30% with a limited number of fogs to push. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 102

    Decision-level fusion for single-view gait recognition with various carrying and clothing conditions حسب Al-Tayyan, Amer

    منشور في 2017
    "…Gait samples are fed into the MPCA and MPCALDA algorithms using a novel tensor-based form of the gait images. …"
    احصل على النص الكامل
    article
  3. 103
  4. 104
  5. 105

    Evolutionary algorithms for state justification in sequential automatic test pattern generation حسب El-Maleh, Aiman H.

    منشور في 2005
    "…Evolutionary algorithms have been effective in solving many search and optimization problems. …"
    احصل على النص الكامل
    article
  6. 106
  7. 107

    Stochastic P-type/D-type iterative learning control algorithms حسب Saab, Samer S.

    منشور في 2003
    "…This paper presents stochastic algorithms that compute optimal and sub-optimal learning gains for a P-type iterative learning control algorithm (ILC) for a class of discrete-time-varying linear systems. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 108
  9. 109

    An ant colony optimization algorithm to improve software quality prediction models حسب Azar, D.

    منشور في 2011
    "…Method This paper presents an adaptive approach that takes already built predictive models and adapts them (one at a time) to new data. We use an ant colony optimization algorithm in the adaptation process. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 110

    Leveraging Machine and Deep Learning Algorithms for hERG Blocker Prediction حسب Syed Mohammad (21075689)

    منشور في 2025
    "…This adjustment highlights the importance of concentration levels in reflecting the variability specific to individual interaction sites. …"
  11. 111
  12. 112
  13. 113
  14. 114
  15. 115

    Design of an innovative and self-adaptive-smart algorithm to investigate the structural integrity of a rail track using Rayleigh waves emitted and sensed by a fully non-contact las... حسب Masurkar, Faeez

    منشور في 2020
    "…The focus of this study is on locating surface and sub-surface defects that occur in rail tracks using Rayleigh waves that were emitted and sensed by a fully non-contact laser transduction system. …"
    احصل على النص الكامل
  16. 116
  17. 117
  18. 118

    GAP - A GENETIC ALGORITHM APPROACH TO OPTIMIZE 2-BIT DECODER PLAS حسب Benten, M. S.

    منشور في 2020
    "…This paper describes a minimization procedure that uses a genetic algorithm approach to reduce the size to the two bit decoder PLAs. …"
    احصل على النص الكامل
    article
  19. 119

    Genetic Algorithm for Solving Site Layout Problem with Unequal-Size and Constrained Facilities حسب Zouein, P. P.

    منشور في 2002
    "…The paper concludes with examples illustrating the strength and limitations of the proposed algorithm in the cases of ~1! loosely versus tightly constrained layouts with equal levels of interaction between facilities; ~2! …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 120

    A Comprehensive Review of AI’s Current Impact and Future Prospects in Cybersecurity حسب Abdullah Al Siam (22304047)

    منشور في 2025
    "…We examine cutting-edge AI methodologies and principal models across many domains, including machine learning algorithms, deep learning architectures, natural language processing techniques, and anomaly detection algorithms, emphasizing their distinct contributions to enhancing security. …"