بدائل البحث:
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
element control » tolerant control (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
element control » tolerant control (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
-
161
Wide area monitoring system operations in modern power grids: A median regression function-based state estimation approach towards cyber attacks
منشور في 2023"…However, the traffic of digital information and communication is potentially vulnerable to data-injection and cyber attacks. To address this issue, a median regression function (MRF)-based state estimation is presented in this paper. …"
-
162
-
163
Graph contraction for physical optimization methods
منشور في 1993"…The mapping solution for the original problem is obtained by a straight-forward interpolation. We then present experimental results on using contracted graphs as inputs to two physical optimization methods; namely, Genetic Algorithm and Simulated Annealing. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
164
Face Recognition in Uncontrolled Indoor Environment
منشور في 2013احصل على النص الكامل
doctoralThesis -
165
Tracking and repairing damaged healthcare databases using the matrix
منشور في 2015"…The algorithm is based on data dependency and uses a single matrix. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
166
Information Warfare
منشور في 2015"…The algorithm is based on data dependency and uses a single matrix that will be later used during recovery.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
167
Scatter search for homology modeling
منشور في 2016"…The metaheuristic optimizes the initial poor alignments and uses fitness functions. We assess our algorithm on a number of proteins whose structures are present in the Protein Data Bank and which have been used in previous literature. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
168
Evacuation of a highly congested urban city
منشور في 2017"…The algorithm uses Dijkstras algorithm to find the shortest path(s) and a modified greedy algorithm to assign maximum flows to selected paths given a specific schedule per time interval. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
169
Optimizing ADWIN for Steady Streams
منشور في 2022"…However, online machine learning comes with many challenges for the different aspects of the learning process, starting from the algorithm design to the evaluation method. One of these challenges is the ability of a learning system to adapt to the change in data distribution, known as concept drift, to maintain the accuracy of the predictions. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
-
170
Scatter search metaheuristic for homology based protein structure prediction. (c2015)
منشور في 2015"…The metaheuristic is guided using two fitness functions, GA341 and DOPE. 3D models are generated using the software MODELLER. We assess our algorithm on a total of 11 proteins whose structures are present in the Protein Data Bank (PDB) and which has been used in previous literature. …"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
171
-
172
Information warfare
منشور في 2017"…Numerous damage assessment and recovery algorithms have been proposed by researchersIn this work, we present an efficient lightweight detection and recovery algorithm that is based on the matrix approach and that can be used to recover from malicious attacks. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
173
Deep Reinforcement Learning for Resource Constrained HLS Scheduling
منشور في 2022"…The two main steps in HLS are: operations scheduling and data-path allocation. In this work, we present a resource constrained scheduling approach that minimizes latency and subject to resource constraints using a deep Q learning algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
174
Assessment of static pile design methods and non-linear analysis of pile driving
منشور في 2006"…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
175
On sensor selection in mobile devices based on energy, application accuracy, and context metrics
منشور في 2013"…In this paper, we propose a sensor selection procedure which decides what sensors to use according to energy, accuracy, and required context metrics. We present an accuracy-energy based algorithm that reduces energy consumption while conserving the required application accuracy. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
176
A new estimator and approach for estimating the subpopulation parameters
منشور في 2021"…<p dir="ltr">Based on some theoretical results, we recommend a new algorithm for estimating the total and mean of a subpopulation variable for the case of a known subpopulation size, which is different from the algorithm recommended by most of sampling books. …"
-
177
Efficient Test Compaction for Combinational Circuits Based on Fault Detection Count-Directed Clustering
منشور في 2006"…Test compaction is an effective technique for reducing test data volume and test application time. In this paper, we present a new static test compaction algorithm based on test vector decomposition and clustering. …"
احصل على النص الكامل
article -
178
A Blockchain Model for Secure Communications in Internet of Vehicles
منشور في 2021"…In this paper, we present a framework for secure IoV communications by utilizing the High Performance Blockchain Consensus (HPBC) algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
179
Regression Testing of Database Applications
منشور في 2002"…In phase 2, further reduction in the regression test cases is performed by using reduction algorithms. We present two such algorithms. The Graph Walk algorithm walks through the control flow graph of database modules and selects a safe set of test cases to retest. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
180
Recovery of business intelligence systems
منشور في 2018"…The efficiency of the data recovery algorithm is substantial for e-healthcare systems. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article