Search alternatives:
method algorithm » mould algorithm (Expand Search)
data scheduling » task scheduling (Expand Search), ahead scheduling (Expand Search)
using algorithm » cosine algorithm (Expand Search)
from using » from urine (Expand Search)
element » elements (Expand Search)
method algorithm » mould algorithm (Expand Search)
data scheduling » task scheduling (Expand Search), ahead scheduling (Expand Search)
using algorithm » cosine algorithm (Expand Search)
from using » from urine (Expand Search)
element » elements (Expand Search)
-
21
Formal synthesis of VLSI layouts from algorithmic specifications
Published 2020Get full text
article -
22
MoveSchedule
Published 1995“…The timing of these needs is inferred from the activity schedule. The layout construction algorithm that underlies MoveSchedule uses Constraint Satisfaction to find the set of all positions that meet the constraints on resources' positions and Linear Programming to find the optimal positions that minimize resource transportation and relocation costs. …”
Get full text
Get full text
Get full text
masterThesis -
23
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
Published 2005“…To test the security of the algorithms we use a famous attack algorithm called Pollard's rho algorithm that works in the domain of natural integers. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
24
-
25
-
26
-
27
Parametric Estimation From Empirical Data Using Particle Swarm Optimization Method for Different Magnetorheological Damper Models
Published 2021“…The validation of the algorithm is attained by comparing the resulting modified Bouc-Wen model behaviour using PSO against the same model's behaviour, identified using Genetic Algorithm (GA). …”
-
28
Capturing outline of fonts using genetic algorithm and splines
Published 2001“…Some examples are given to show the results obtained from the algorithm…”
Get full text
Get full text
article -
29
Extended Behavioral Modeling of FET and Lattice-Mismatched HEMT Devices
Published 2016Subjects: Get full text
doctoralThesis -
30
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
31
An Auction-Based Scheduling Approach for Minimizing Latency in Fog Computing Using 5G Infrastructure
Published 2020Get full text
doctoralThesis -
32
A Graph Heuristic Approach for the Data Path Allocation Problem
Published 2022Get full text
Get full text
Get full text
masterThesis -
33
A Novel Hybrid Genetic-Whale Optimization Model for Ontology Learning from Arabic Text
Published 2019“…The previously published research on Arabic ontology learning from text falls into three categories: developing manually hand-crafted rules, using ordinary supervised/unsupervised machine learning algorithms, or a hybrid of these two approaches. …”
Get full text
Get full text
-
34
-
35
Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study
Published 2021“…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …”
Get full text
article -
36
Cryptocurrency Exchange Market Prediction and Analysis Using Data Mining and Artificial Intelligence
Published 2020“…One of the best algorithms in terms of the result is the Long Short Term Memory (LSTM) since it is based on recurrent neural networks which uses loop as a method to learn from heuristics data. …”
Get full text
-
37
-
38
Final exams scheduling for univeristies. (c2001)
Published 2001Get full text
Get full text
masterThesis -
39
Starvation Problem in CPU Scheduling for Multimedia Systems
Published 2002“…Integrating discrete and continuous data of digital audio and video requires additional services from operating systems, especially handling of time-constrained characteristics of continuous media data, which poses a real-time characteristics on the underlying scheduler. …”
Get full text
article -
40
Using machine learning algorithm for detection of cyber-attacks in cyber physical systems
Published 2022“…We have suggested the SFL-HMM together with HMS-ACO process as a method used for detection of the cyber attacks. A MATLAB simulation used to evaluate the new strategy, and the metrics obtained from that simulation are compared to those obtained from the older methods. …”
Get full text
Get full text