يعرض 41 - 60 نتائج من 188 نتيجة بحث عن '(( complex system algorithm ) OR ((( element cc3d algorithm ) OR ( neural coding algorithm ))))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 41

    A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks حسب Saad, Walid

    منشور في 2012
    "…While most existing literature focuses on downlink-only or uplink-only scheduling algorithms, the proposed algorithm aims at ensuring a utility function that jointly captures the quality of service in terms of delay and channel quality on both links. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 42

    Improved Jaya Synergistic Swarm Optimization Algorithm to Optimize Task Scheduling Problems in Cloud Computing حسب Abualigah, Laith

    منشور في 2024
    "…One critical aspect of cloud computing is efficient task scheduling, which directly impacts system performance and resource utilization. In this paper, we propose an enhanced optimization algorithm tailored for task scheduling in cloud environments. …"
    احصل على النص الكامل
  3. 43
  4. 44

    A heuristics for HTTP traffic identification in measuring user dissimilarity حسب Adeyemi R. Ikuesan (14157123)

    منشور في 2020
    "…This study reveals that, with the current complex nature of Internet and HTTP traffic, browser complexity, dynamic web programming structure, the surge in network delay, and unstable user behavior in network interaction, user-initiated requests can be accurately determined. …"
  5. 45
  6. 46
  7. 47
  8. 48

    Adaptive Secure Pipeline for Attacks Detection in Networks with set of Distribution Hosts حسب ALSHAMSI, SUROUR

    منشور في 2022
    "…It is difficult to have efficient detection systems to precisely separate normal behavior from malicious behavior, based on the analysis of network traffic. …"
    احصل على النص الكامل
  9. 49

    Predicting stability of classes in an object-oriented system حسب Azar, D.

    منشور في 2010
    "…In this paper, we present a heuristic approach that relies on the adaptation and recombination of already built predictive models to new unseen software.The predictive models are all rule-based models and the approach is tested on the stability of classes in an object-oriented software system. We compare our results to the machine learning algorithm C4.5, and we show that our approach out-beats it.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  10. 50

    Hardware Model of an Expandable RSA Cryptographic System حسب Gutub, Adnan

    منشور في 1998
    "…One of the most popular cryptographic systems is the RSA system. The security of the RSA-encrypted information largely depends on the size of the used encryption key. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  11. 51

    Robust tuning of power system stabilizers in multimachine powersystems حسب Abdel-Magid, Y.L.

    منشور في 2000
    "…The problem of selecting the stabilizer parameters is converted to a simple optimization problem with an eigenvalue-based objective function, which is solved by a tabu search algorithm. The objective function allows the selection of the stabilizer parameters to optimally place the closed-loop eigenvalues in the left-hand side of a vertical line in the complex s-plane. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 52

    Reinforcement Learning-Based School Energy Management System حسب Yassine Chemingui (18891757)

    منشور في 2020
    "…Conventional Building Energy Management methods suffer from a high dimensional and complex control environment. In recent years, the Deep Reinforcement Learning algorithm, applying neural networks for function approximation, shows promising results in handling such complex problems. …"
  13. 53

    A Hardware Model of an Expandable RSA Cryptogrsphic System حسب Gutub, Adnan

    منشور في 1998
    "…One of the most popular cryptographic systems is the RSA system. The security of the RSA-encrypted information largely depends on the size of the used encryption key. …"
    احصل على النص الكامل
    masterThesis
  14. 54

    Estimation of the methanol loss in the gas hydrate prevention unit using the artificial neural networks: Investigating the effect of training algorithm on the model accuracy حسب Haitao Xu (435549)

    منشور في 2023
    "…The complex gas hydrate prevention unit is simulated using the MLPNN model trained by 20 different optimization algorithms. …"
  15. 55

    Power system output feedback stabilizer design via geneticalgorithms حسب Abdel-Magid, Y.L.

    منشور في 1997
    "…The paper demonstrates the use of genetic algorithms to design output feedback power system stabilizers. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  16. 56

    Framework for rapid design and optimisation of immersive battery cooling system حسب Ali Almshahy (23544823)

    منشور في 2025
    "…Two key parameters are optimised, namely: battery gap spacing (3–10 mm) and inlet/outlet width (5–15 mm), via Optimal Latin Hypercube Sampling, Support Vector Regression, and GDE3 algorithm. Palm biodiesel is used as a dielectric coolant in the proposed system to preserve LIB temperature within 20–40°C, preventing thermal runaway and ensuring a lightweight BTMS design. …"
  17. 57
  18. 58

    Analysis of Multi-User-Based UAV System With Outdated CSI حسب Parvez Shaik (21633041)

    منشور في 2024
    "…<p dir="ltr">In this paper, we investigate the performance of multiple-input and multiple-output (MIMO) unmanned air vehicle (UAV) based multi-user communication systems over generalized Nakagami- m fading channels subject to channel feedback delays. …"
  19. 59
  20. 60