يعرض 641 - 660 نتائج من 825 نتيجة بحث عن '(( data using algorithm ) OR ((( develop research algorithm ) OR ( relevant data algorithm ))))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 641
  2. 642

    Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks حسب Muhammed Al-Ali (16810677)

    منشور في 2023
    "…An optimal resource allocation scheme is proposed with two scenarios including a guaranteed fairness level and minimum data rate among eMBB users. In addition, a knapsack-inspired punctured resource allocation algorithm is proposed where the users’ channel qualities of both services are considered at each time slot leading to the most suitable Resource Block (RB) selection for puncturing in a way that minimizes the negative impact on eMBB performance. …"
  3. 643

    Uplink Noma in UAV-Assisted IoT Networks حسب Mrad, Ali

    منشور في 2022
    "…Given the complexity of the problem and the incomplete knowledge about the environment, the problem is divided into two subproblems: the first models the UAV trajectory and the selection of the first device in the NOMA cluster at each time slot as a Markov Decision Process, and uses Proximal Policy Optimization to solve it. The second device is then selected using a heuristic algorithm based on prioritizing devices with higher bit rate requirements and strict deadlines. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  4. 644
  5. 645
  6. 646

    Deploying model obfuscation: towards the privacy of decision-making models on shared platforms حسب Sadhukhan, Payel

    منشور في 2024
    "…The future work lies with the implementation and establishment of its viability. This research is expected to develop into deployable model obfuscation technique which practitioners from the industrial domain can adopt.…"
    احصل على النص الكامل
    احصل على النص الكامل
  7. 647
  8. 648

    Anonymizing multimedia documents حسب Haraty, Ramzi

    منشور في 2016
    "…In this paper, we propose de-linkability, a privacy-preserving constraint to bound the amount of information outsourced that can be used to re-identify individuals. We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  9. 649
  10. 650

    Structural similarity evaluation between XML documents and DTDs حسب Tekli, J.

    منشور في 2007
    "…The automatic processing and management of XML-based data are ever more popular research issues due to the increasing abundant use of XML, especially on the Web. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  11. 651

    An Infrastructure-Assisted Crowdsensing Approach for On-Demand Traffic Condition Estimation حسب Abdul Rahman, Sawsan

    منشور في 2019
    "…However, the current solutions proposed for the use of crowdsensing for the collection of traffic related data adopt an opportunistic continuous sensing approach, which entails high resource consumption on the server and mobile device side, a high communication overhead, while offering little control of the users over the sensing activity. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 652

    Investigating the Impact of Skylights and Atrium Configurations on Visual Comfort and Daylight Performance in Dubai Shopping Malls حسب SANAD, AYMAN ADEL AHMED

    منشور في 2025
    "…Comparative analysis quantifies such improvements, and generic guidelines are developed for broader application, along with a discussion of future steps and possible research opportunities.…"
    احصل على النص الكامل
  13. 653

    Active distribution network type identification method of high proportion new energy power system based on source-load matching حسب Qinlin, Shi

    منشور في 2023
    "…Firstly, the typical daily output scenarios of DG are extracted by clustering method, and the generalized load curve model is solved by the optimization algorithm to obtain the source load operation data; Secondly, calculate the source-load matching indicators (including matching performance, matching degree, and matching rate) according to the source load data of each region, and identify the distribution network type according to the range of the index values; Finally, several indicators are introduced to quantify the characteristics of different types of distribution networks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  14. 654

    ARDENT: A Proactive Agent-Based Routing Protocol for Internet of Vehicles حسب Mazouzi, Mohamed

    منشور في 2023
    "…The design of an efficient routing algorithm for the Internet of Vehicles (IoV) poses several problems due to its special characteristics, including nodes high-speed mobility, frequent topology change, link instability, and the presence of radio obstacles. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 655
  16. 656

    A new bi-objective model of the urban public transportation hub network design under uncertainty حسب Firoozeh Kaveh (14150877)

    منشور في 2019
    "…For medium and large-sized problems, a meta-heuristic algorithm, namely multi-objective particle swarm optimization is applied and its performance is compared with results from the non-dominated sorting genetic algorithm. …"
  17. 657
  18. 658
  19. 659

    Decomposition-based wind power forecasting models and their boundary issue: An in-depth review and comprehensive discussion on potential solutions حسب Yinsong Chen (16685508)

    منشور في 2022
    "…These methods generally disaggregate the original time series data into sub-time-series with better stationarity, and then the target data is predicted based on the sub-series. …"
  20. 660