بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
codes algorithm » colony algorithm (توسيع البحث), cosine algorithm (توسيع البحث)
data codes » data models (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
codes algorithm » colony algorithm (توسيع البحث), cosine algorithm (توسيع البحث)
data codes » data models (توسيع البحث)
-
141
An Alternating Projection Framework for Elementwise Masked Nonlinear Matrix Decomposition
منشور في 2025احصل على النص الكامل
doctoralThesis -
142
A Literature Review on System Dynamics Modeling for Sustainable Management of Water Supply and Demand
منشور في 2023"…One noticeable finding is that only 12% of the articles used quantitative models to complement SDM for the decision-making process. The models included agent-based modeling (ABM), Bayesian networking (BN), analytical hierarchy approach (AHP), and simulation optimization multi-objective optimization (MOO). …"
-
143
An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation
منشور في 2001"…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
احصل على النص الكامل
article -
144
An evolutionary meta-heuristic for state justification insequential automatic test pattern generation
منشور في 2001"…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
احصل على النص الكامل
احصل على النص الكامل
article -
145
Recovery of business intelligence systems
منشور في 2018"…Reducing the execution time of recovery is the key target of our algorithm. The proposed algorithm outperforms the existing algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
146
-
147
Dynamic single node failure recovery in distributed storage systems
منشور في 2017"…With the emergence of many erasure coding techniques that help provide reliability in practical distributed storage systems, we use fractional repetition coding on the given data and optimize the allocation of data blocks on system nodes in a way that minimizes the system repair cost. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
148
Vehicular-OBUs-As-On-Demand-Fogs
منشور في 2020"…An Evolutionary Memetic Algorithm is elaborated to solve our vehicular container placement problem. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
149
A Biologicaly Inspired Decision Model for Multivariable Genetic- Fuzzy-AHP System
منشور في 2016"…This paper describes a hybridized intelligent algorithm as a tuning mechanism for one type of Genetic Fuzzy system termed the Genetic Fuzzimetric Technique (GFT). …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
150
Simple and effective neural-free soft-cluster embeddings for item cold-start recommendations
منشور في 2022"…The best available recommendation algorithms are based on using the observed preference information among collaborating entities. …"
-
151
Rate Adaptation in Dynamic Adaptive Video Streaming Over HTTP
منشور في 2021احصل على النص الكامل
doctoralThesis -
152
An evolutionary approach to load balancing parallel computations
منشور في 1991"…We present a new approach to balancing the workload in a multicomputer. It is based on a genetic algorithm that combines a number of design choices in order to ameliorate the problem of premature convergence. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
153
Approximate XML structure validation based on document–grammar tree similarity
منشور في 2015"…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
154
Morphology for Planar Hexagonal Modular Self-Reconfigurable Robotic Systems
منشور في 2009احصل على النص الكامل
doctoralThesis -
155
Computation of conformal invariants
منشور في 2020"…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
156
Corona power loss computation in bundled bipolar conductors
منشور في 2000"…In this paper, a finite element (FE) based algorithm devoted for the computation of the corona current and hence the corona power loss associated with bundled bipolar high voltage direct current (HVDC) conductors is presented. …"
احصل على النص الكامل
احصل على النص الكامل
article -
157
Approximate XML structure validation technical report
منشور في 2014"…In this paper, we propose an original method for measuring the structural similarity between an XML document and an XML grammar (DTD or XSD), considering their most common operators that designate constraints on the existence, repeatability and alternativeness of XML elements/attributes (e.g., ?…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
158
Edge intelligence for network intrusion prevention in IoT ecosystem
منشور في 2023"…A system architecture is designed for a cloud-based IoT framework to implement the proposed algorithm efficiently. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
159
Mobile Robot Trajectory Tracking Using Neural Networks
منشور في 2009احصل على النص الكامل
doctoralThesis -
160
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security
منشور في 2024"…The novel contribution of this work is to incorporate the operations of Rabin digital data signature generation, DIDLT‐based blockchain construction, and BCA algorithms for ensuring overall data security in IoT networks. …"