بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
based scheduling » task scheduling (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
based scheduling » task scheduling (توسيع البحث)
-
141
A method for efficient NoC test scheduling using deterministic routing
منشور في 2017"…This paper presents a method for NoCs test scheduling using simulated annealing. The method uses a deterministic routing algorithm that minimizes test time while avoiding blocking. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
142
An enhanced quorum selection algorithm
منشور في 2009احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
143
An Improved Quorum Selection Algorithm
منشور في 2008احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
144
-
145
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
منشور في 2020"…TIDCS reduces the number of features in the input data based on a new algorithm for feature selection. …"
-
146
A Micro-Economics Approach for Scheduling in CDMA Networks with End-to-End QoS Guarantees
منشور في 2007"…To efficiently utilize the available radio resources, we propose a new scheduling algorithm based on techniques from micro-economics. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
147
Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval
منشور في 2024"…Generally, RKPCA reduces the number of samples in the training data set and then builds the KPCA model based on this data set. …"
-
148
A hybrid cryptosystem based on WEP for 802.11 networks. (c2006)
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
masterThesis -
149
Robust Control Of Sampled Data Systems
منشور في 2020"…They then present a numerical controller design algorithm based on the derived bounds. Examples are used for demonstration.…"
احصل على النص الكامل
article -
150
Robust control of sampled data systems
منشور في 1998"…They then present a numerical controller design algorithm based on the derived bounds. Examples are given for demonstration…"
احصل على النص الكامل
احصل على النص الكامل
article -
151
Robust Control Of Sampled Data Systems
منشور في 2020"…They then present a numerical controller design algorithm based on the derived bounds. Examples are used for demonstration.…"
احصل على النص الكامل
article -
152
Robust Control Of Sampled Data Systems
منشور في 2020"…They then present a numerical controller design algorithm based on the derived bounds.Examples are used for demonstration.…"
احصل على النص الكامل
article -
153
Bee Colony Algorithm for Proctors Assignment.
منشور في 2015"…The Bee Colony algorithm is a recent population-based search algorithm that mimics the natural behavior of swarms of honey bees during the process of collecting food. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
154
Type 2 Diabetes Mellitus Automated Risk Detection Based on UAE National Health Survey Data: A Framework for the Construction and Optimization of Binary Classification Machine Learn...
منشور في 2020"…A special consideration was given to data pre-processing and dimensionality reduction such Chi Squared (CS) and Recursive Feature Elimination (RFE) to improve progressively the proposed models performance. …"
احصل على النص الكامل
-
155
Data Redundancy Management in Connected Environments
منشور في 2020"…We describe its modules, and clustering-based algorithms. Moreover, our proposal detects temporal, and spatial-temporal redundancies in order to consider both static and mobile devices/sensors. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
156
Unsupervised outlier detection in multidimensional data
منشور في 2022"…<p>Detection and removal of outliers in a dataset is a fundamental preprocessing task without which the analysis of the data can be misleading. Furthermore, the existence of anomalies in the data can heavily degrade the performance of machine learning algorithms. …"
-
157
Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment
منشور في 2022"…<p>Resistance to differential cryptanalysis is a fundamental security requirement for symmetric block ciphers, and recently, deep learning has attracted the interest of cryptography experts, particularly in the field of block cipher cryptanalysis, where the bulk of these studies are differential distinguisher based black-box attacks. This paper provides a deep learning-based decryptor for investigating the permutation primitives used in multimedia block cipher encryption algorithms.We aim to investigate how deep learning can be used to improve on previous classical works by employing ciphertext pair aspects to maximize information extraction with low-data constraints by using convolution neural network features to discover the correlation among permutable atoms to extract the plaintext from the ciphered text without any P-box expertise. …"
-
158
An effective solution to thermal-aware test scheduling on network-on-chip using multiple clock rates
منشور في 2017"…In this paper, a simulated annealing algorithm for thermal and power-aware test scheduling of cores in a NoC-based SoC using multiple clock rates is presented. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
159
-
160
A kernelization algorithm for d-Hitting Set
منشور في 2010"…For 3-Hitting Set, an arbitrary instance is reduced into an equivalent one that contains at most 5k2+k elements. This kernelization is an improvement over previously known methods that guarantee cubic-order kernels. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article