Showing 1 - 20 results of 250 for search '(( elements data algorithm ) OR ((( data scheduling algorithm ) OR ( based finding algorithm ))))*', query time: 0.13s Refine Results
  1. 1
  2. 2

    Efficient Dynamic Cost Scheduling Algorithm for Data Batch Processing by Al Sadawi, Alia

    Published 2016
    “…A Master of Science thesis in Engineering Systems Management by Alia Al Sadawi entitled, "Efficient Dynamic Cost Scheduling Algorithm for Data Batch Process," submitted in May 2016. …”
    Get full text
    doctoralThesis
  3. 3

    Efficient Dynamic Cost Scheduling Algorithm for Financial Data Supply Chain by Al Sadawi, Alia

    Published 2021
    “…An iterative dynamic scheduling algorithm (DCSDBP) was developed to address the data batching process. …”
    Get full text
    article
  4. 4
  5. 5

    Stochastic Search Algorithms for Exam Scheduling by Mansour, Nashat

    Published 2007
    “…Then, we empirically compare the three proposed algorithms and FESP using realistic data. Our experimental results show that SA and GA produce good exam schedules that are better than those of FESP heuristic procedure. …”
    Get full text
    Get full text
    article
  6. 6
  7. 7
  8. 8
  9. 9

    Three-phase simulated annealing algorithms for exam scheduling by Mansour, Nashat

    Published 2003
    “…We empirically compare 3PSA with a 4-phase clustering-based heuristic algorithm using realistic data. Our experimental results show that 3PSA produces good exam schedules, which are better than those of the clustering heuristic procedure.…”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  10. 10
  11. 11
  12. 12
  13. 13

    Optimized Load-Scheduling Algorithm for CubeSat's Electric Power System Management Considering Communication Link by Bayan Hussein (16904856)

    Published 2023
    “…The solution obtained shows that the proposed scheduling algorithm meets the communication system's requirements while conserving power and energy resources.…”
  14. 14
  15. 15

    Application of Red Deer Algorithm in Optimizing Complex functions by Zitar, Raed

    Published 2021
    “…The Red Deer algorithm (RDA), a recently developed population-based meta-heuristic algorithm, is examined in this paper with the optimization task of complex functions. …”
    Get full text
    Get full text
  16. 16

    MoveSchedule by Zouein, Pierette

    Published 1995
    “…The timing of these needs is inferred from the activity schedule. The layout construction algorithm that underlies MoveSchedule uses Constraint Satisfaction to find the set of all positions that meet the constraints on resources' positions and Linear Programming to find the optimal positions that minimize resource transportation and relocation costs. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  17. 17

    Multilayer Reversible Data Hiding Based on the Difference Expansion Method Using Multilevel Thresholding of Host Images Based on the Slime Mould Algorithm by Abu Zitar, Raed

    Published 2022
    “…The slime mould algorithm (SMA) gives good results in finding the best solutions to optimization problems. …”
    Get full text
  18. 18
  19. 19

    Bird’s Eye View feature selection for high-dimensional data by Samir Brahim Belhaouari (16855434)

    Published 2023
    “…This approach is inspired by the natural world, where a bird searches for important features in a sparse dataset, similar to how a bird search for sustenance in a sprawling jungle. BEV incorporates elements of Evolutionary Algorithms with a Genetic Algorithm to maintain a population of top-performing agents, Dynamic Markov Chain to steer the movement of agents in the search space, and Reinforcement Learning to reward and penalize agents based on their progress. …”
  20. 20

    A matrix-based damage assessment and recovery algorithm by Haraty, Ramzi A.

    Published 2014
    “…To make the process of damage assessment and recovery fast and effective (not scanning the entire log), researchers have proposed different methods for segmenting the log file, and accordingly presented different damage assessment and recovery algorithms. In this work we present efficient damage assessment and recovery algorithms to recover from malicious transactions in a database based on the concept of the matrix. …”
    Get full text
    Get full text
    Get full text
    conferenceObject