بدائل البحث:
algorithm goa » algorithm fa (توسيع البحث), algorithm _ (توسيع البحث)
goa function » cost function (توسيع البحث)
algorithms a » algorithms _ (توسيع البحث), algorithm _ (توسيع البحث), algorithm fa (توسيع البحث)
algorithm a » algorithm fa (توسيع البحث), algorithm _ (توسيع البحث), algorithm aoa (توسيع البحث)
a function » _ functional (توسيع البحث)
algorithm goa » algorithm fa (توسيع البحث), algorithm _ (توسيع البحث)
goa function » cost function (توسيع البحث)
algorithms a » algorithms _ (توسيع البحث), algorithm _ (توسيع البحث), algorithm fa (توسيع البحث)
algorithm a » algorithm fa (توسيع البحث), algorithm _ (توسيع البحث), algorithm aoa (توسيع البحث)
a function » _ functional (توسيع البحث)
-
261
Anonymizing multimedia documents
منشور في 2016"…We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
262
Traffic Offloading with Channel Allocation in Cache-Enabled Ultra-Dense Wireless Networks
منشور في 2018"…We generate results as a function of a wide range of system parameters, and demonstrate that the proposed algorithms achieve near-optimal performance with notably low time complexity.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
263
Parameter Identification of Flexible Drive Systems using Particle Swarm Optimization
منشور في 2023احصل على النص الكامل
doctoralThesis -
264
Multi Agent Reinforcement Learning Approach for Autonomous Fleet Management
منشور في 2019احصل على النص الكامل
doctoralThesis -
265
Energy-Efficient Computation Offloading in Vehicular Edge Cloud Computing
منشور في 2020"…Subsequently, we propose a method to measure the cost-effectiveness of allocated resources and energy savings, named value density function. …"
-
266
Axes-Based Encryption Key
منشور في 2018"…This paper introduces a new approach in cryptography based on the distribution of data using an x-y key function. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
267
New aspect-oriented constructs for security hardening concerns
منشور في 2009"…The two proposed primitives are called ExportParameter and ImportParameter and are used to pass parameters between two pointcuts. They allow to analyze a program's call graph in order to determine how to change function signatures for passing the parameters associated with a given security hardening. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
268
Real-Time Implementation of GPS Aided Low Cost Strapdown Inertial Navigation System
منشور في 2009احصل على النص الكامل
doctoralThesis -
269
Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles
منشور في 2000"…In this paper a forcing function which is derived from a spherical-cavity expansion (SCE) analysis has been implemented in a transient dynamic finite element code. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
270
-
271
Integrated Energy Optimization and Stability Control Using Deep Reinforcement Learning for an All-Wheel-Drive Electric Vehicle
منشور في 2025"…., linear quadratic regulator with the sequential quadratic programming (LSQP) and sliding mode control with SQP (SSQP). A tailored multi-term reward function is structured to penalize excessive yaw rate error, sideslip angle, tire slip deviations beyond peak grip regions, and power losses based on a realistic electric machine efficiency map. …"
-
272
Modeling and Identification of Nonlinear DC Motor Drive Systems Using Recurrent Wavelet Networks
منشور في 2013احصل على النص الكامل
doctoralThesis -
273
CFD Based Airfoil Shape Optimization for Aerodynamic Drag Reduction
منشور في 2012احصل على النص الكامل
doctoralThesis -
274
Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité
منشور في 2009"…The two proposed primitives are called exportParameter and importParameter and are used to pass parameters between two pointcuts. They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
275
An Introduction to the Special Issue “Protein Glycation in Food, Nutrition, Health and Disease”
منشور في 2022"…The keynote speaker was Lasker Laureate Professor Kazutoshi Mori, speaking on the unfolded protein response, and there were sessions on: glycation in obesity, diabetes, and diabetic complications; glycation in food; glycation through the life course—from maternal bonding to aging; glycation in plants—physiology, function, and food security; glycation in the COVID-19 response; glycation analytics and chemistry; glycation in kidney disease, cancer, and mental health; glycation-related imaging, diagnostic algorithms, and therapeutics; and methods and models in glycation research. …"
-
276
Artificial intelligence in respiratory care
منشور في 2024"…Despite barriers, the current decade is witnessing an increased utility of AI into diverse specialities of the medical field to enhance precision medicine, predict diagnosis, therapeutic results, and prognosis; this includes respiratory medicine, critical care, and in their allied specialties. AI algorithms are widely studied in areas like mechanical ventilation, sleep medicine, lung ultrasound, and pulmonary function diagnostics and the results are found to be promising. …"
-
277
Optimized 3D Deployment of UAV-Mounted Cloudlets to Support Latency-Sensitive Services in IoT Networks
منشور في 2019"…We formulate the problem as a mixed integer program, and propose an efficient meta-heuristic solution based on the ions motion optimization algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
278
On-demand deployment of multiple aerial base stations for traffic offloading and network recovery
منشور في 2019"…We present performance results for the proposed algorithm as a function of various system parameters and demonstrate its effectiveness compared to the close-to-optimal greedy approach and its superiority compared to recent related work from the literature.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
279
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
منشور في 2023"…In the predicted model, an analytical framework is created to operate the robot within predetermined areas while maximizing communication ranges. Additionally, a clustering algorithm with a fuzzy membership function is implemented, allowing the robots to advance in accordance with predefined clusters and arrive at their starting place within a predetermined amount of time. …"
-
280
Optimized provisioning of edge computing resources with heterogeneous workload in IoT networks
منشور في 2019"…We analyze the effectiveness of the proposed algorithm through extensive simulations and highlight valuable performance trends and trade-offs as a function of various system parameters.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article