بدائل البحث:
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
work algorithm » swarm algorithm (توسيع البحث), rd algorithm (توسيع البحث)
td3 algorithm » rd algorithm (توسيع البحث)
complement » implement (توسيع البحث), complementary (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
work algorithm » swarm algorithm (توسيع البحث), rd algorithm (توسيع البحث)
td3 algorithm » rd algorithm (توسيع البحث)
complement » implement (توسيع البحث), complementary (توسيع البحث)
-
161
Transaction Dependency Based Approach for Database Damage Assessment Using a Matrix
منشور في 2017"…Hence, both affected and benign transactions will be rolled back, which is a waste of time. This paper presents an algorithm that works efficiently to assess the damage caused in the database by malicious transaction and recovers it. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
162
Innovative mobile E-healthcare systems
منشور في 2016"…In this work, we propose a new cache replacement algorithm—Profit SACCS—that is based on the rule-based least profit value. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
163
Hardening the ElGamal Cryptosystem in the Setting of the Second Group of Units
منشور في 2014"…We describe the arithmetic needed in the new setting, and present examples, proofs and algorithms to illustrate the applicability of the proposed scheme. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
164
An Efficient Prediction System for Diabetes Disease Based on Deep Neural Network
منشور في 2021"…A performance comparison between the DNN algorithm and some well‐known machine learning techniques as well as the state‐of‐the‐art methods is presented. …"
-
165
Multi-Agent Learning of Strategies in Abstract Argumentation Mechanisms
منشور في 2009"…Once all arguments have been presented, the judge must make a ruling: i.e decide which arguments are valid and hence which agents win by presenting them. …"
احصل على النص الكامل
-
166
Exploring the System Dynamics of Covid-19 in Emergency Medical Services
منشور في 2022"…In this context, this research presents descriptive and predictive analysis to fully explore the Covid-19 impact on EMS in Lebanon. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
167
Damage assessment and recovery from malicious transactions using data dependency for defensive information warfare
منشور في 2007"…Since even segmenting the log into clusters may not solve the problem, as clusters/segments may grow to be humongous in size, this is in case of high data/transaction dependency, we suggest a method for segmenting the log into clusters and its sub-clusters; i.e, segmenting the cluster; based on exact data dependency [12], into sub-clusters; based on two different criteria: number of data items or space occupied. In this work, we also present damage assessment and recovery algorithms, and show the performance results.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
168
Data Redundancy Management in Connected Environments
منشور في 2020"…Finally, we present our experimental protocol and share preliminary results.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
169
ANT-colony optimization-direct torque control for a doubly fed induction motor : An experimental validation
منشور في 2022"…For that reason, this work is focused on the theoretical studies and experimental validation on dSPACE Board DS1104 of the new proposed approach based on PID speed regulation, optimized by the Ant Colony Optimization algorithm (ACO) for DTC, applied to both sides of the Doubly Fed Induction Motor (DFIM), to overcome the previous drawbacks cited at the beginning. …"
-
170
Industrial Internet of Things enabled technologies, challenges, and future directions
منشور في 2023"…A blockchain-based security framework for the cement sector can resolve 51% of security issues and Sybil attacks caused by consensus algorithms like Proof of Work (PoW). Major companies' performance depends on well-designed IIoT infrastructure, despite significant challenges. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
171
A Software detector of the Wolff-Parkinson-White (WPW) Syndrome
منشور في 2000"…The program has been tested on 107 patients, with a success rate of 93 percent. As for the two algorithms that detect the location of the syndrome (if it exists) in the human heart, D'Avilla's Algorithm worked for 70 percent of the patients with WPW where Iturralde's Algorithm worked for 75 percent of these patients.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
172
Virtual Inertia Support in Power Systems for High Penetration of Renewables—Overview of Categorization, Comparison, and Evaluation of Control Techniques
منشور في 2022"…Integrating intelligent methods, such as fuzzy logic, genetic algorithm, non-convex optimization, and heuristic optimization, signify intelligent control methods. …"
-
173
3D deployment of UAVs in wireless networks for traffic offloading and edge computing. (c2019)
منشور في 2019"…The simulation results presented in this thesis demonstrate the e ectiveness of the proposed solutions and algo- rithms compared to the optimal solutions and related work in the literature for various network scenario…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
174
Short-Term Load Forecasting in Active Distribution Networks Using Forgetting Factor Adaptive Extended Kalman Filter
منشور في 2023"…Therefore, high-quality load forecasting is essential for distribution network planning and operation. Most of the work presented in literature focusing on Short-Term Load Forecasting (STLF) has paid little consideration to the intrinsic uncertainty associated with the load dataset. …"
-
175
EEG-Based Multi-Modal Emotion Recognition using Bag of Deep Features: An Optimal Feature Selection Approach
منشور في 2019"…The proposed model achieves better classification accuracy compared to the recently reported work when validated on SJTU SEED and DEAP data sets. …"
-
176
-
177
Industrial Internet of Things enabled technologies, challenges, and future directions
منشور في 2023"…A blockchain-based security framework for the cement sector can resolve 51% of security issues and Sybil attacks caused by consensus algorithms like Proof of Work (PoW). Major companies' performance depends on well-designed IIoT infrastructure, despite significant challenges. …"
-
178
-
179
Reactive transport in porous media: a review of recent mathematical efforts in modeling geochemical reactions in petroleum subsurface reservoirs
منشور في 2021"…<div><p>The rapid advancements in the computational abilities of numerical simulations have attracted researchers to work on the area of reactive transport in porous media to improve the hydrocarbon production processes from mature reservoirs. …"
-
180
Dynamic multiple node failure recovery in distributed storage systems
منشور في 2018"…The four problems are modeled using incidence matrices and solved heuristically. We present a range of results for our proposed algorithms in several scenarios to assess the effectiveness of the solution approaches that are shown to generate results close to optimal.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article