بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
taking algorithm » cosine algorithm (توسيع البحث)
data finding » data mining (توسيع البحث), data hiding (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
taking algorithm » cosine algorithm (توسيع البحث)
data finding » data mining (توسيع البحث), data hiding (توسيع البحث)
-
161
A novel XML document structure comparison framework based-on sub-tree commonalities and label semantics
منشور في 2011"…XML similarity evaluation has become a central issue in the database and information communities, its applications ranging over document clustering, version control, data integration and ranked retrieval. Various algorithms for comparing hierarchically structured data, XML documents in particular, have been proposed in the literature. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
162
Newton-Raphson based adaptive inverse control scheme for tracking of nonlinear dynamic plants
منشور في 2006"…The U-model is utilized to design an adaptive inverse controller by using a simple root-solving algorithm of Newton-Raphson. The synergy of U-model with AIC structure has provided an effective and straight forward method for adaptive tracking of nonlinear plants. …"
احصل على النص الكامل
احصل على النص الكامل
article -
163
A Full-System Approach of the Elastohydrodynamic Line/Point Contact Problem
منشور في 2008"…The use of the finite element method allows the use of variable unstructured meshing and different types of elements within the same model which leads to a reduced size of the problem. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
164
Scalable Multimedia Streaming in Wireless Networks with Device-to-Device Cooperation
منشور في 2016"…The key novel characteristics of our system include seamless neighbor discovery and link quality estimation, intelligent clustering and channel allocation algorithms based on constrained minimum spanning trees, robustness against device mobility, and device centric operation with no changes to existing wireless systems. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
165
Traffic Offloading with Channel Allocation in Cache-Enabled Ultra-Dense Wireless Networks
منشور في 2018"…Traffic offloading via device-to-device communications is expected to play a major role to meet the exponential data traffic growth in wireless networks. In this work, we focus on the problem of user capacity maximization in ultra dense heterogeneous networks with device-to-device cooperation, where a large number of users in a given geographical area request common data content, such as video on demand streaming, with strict quality of service guarantees. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
166
The Frontiers of Deep Reinforcement Learning for Resource Management in Future Wireless HetNets: Techniques, Challenges, and Research Directions
منشور في 2022"…To this end, we carefully identify the types of DRL algorithms utilized in each related work, the elements of these algorithms, and the main findings of each related work. …"
-
167
Scatter search technique for exam timetabling
منشور في 2011"…We evaluate our suggested technique on real-world university data and compare our results with the registrar’s manual timetable in addition to the timetables of other heuristic optimization algorithms. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
168
Soft Sensor for NOx Emission using Dynamical Neural Network
منشور في 2020"…Lag space for the model is found by using genetic algorithm to find the best time delayed model. Lag space obtained from the linear model is then used for constriction of the dynamical neural network. …"
احصل على النص الكامل
article -
169
Common weaving approach in mainstream languages for software security hardening
منشور في 2013"…In the first approach, we prove them according to the rules and algorithms provided in this paper. In the second approach, we accommodate Kniesel's discipline that ensures that security solutions specified by our approach are applied at all and only the required points in source code, taking into consideration weaving interactions and interferences. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
170
Clustering Tweets to Discover Trending Topics about دبي (Dubai)
منشور في 2018"…One of these social networks is Twitter - a microblogging hub and rich environment of data. Scanning tweets online is a hard task and searching effortlessly to find intended topic from huge amount of data is also time consuming. …"
احصل على النص الكامل
-
171
Resource Optimization for 3D Video SoftCast with Joint Texture/Depth Power Allocation
منشور في 2022"…Then, a minimum distortion optimization algorithm iteratively computes all the possible resource allocations to find the optimal allocation based on the minimum distortion. …"
-
172
Simulations of the penetration of 6061-T6511 aluminum targets by spherical-nosed VAR 4340 steel projectiles
منشور في 2000"…In the context of an analysis code, this approximation eliminates the need for discretizing the target as well as the need for a contact algorithm. Thus, this method substantially reduces the computer time and memory requirements. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
173
Vibration suppression in a cantilever beam using a string-type vibration absorber
منشور في 2017"…The string is rigidly connected to the fixed end of the beam and through a spring and damper to a second point on the beam. The finite element method is used to model the system and a reduced order model is obtained through modal reduction performed on both the string and the beam. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
174
Innovative mobile E-healthcare systems
منشور في 2016"…Caching is one of the key methods in distributed computing environments to improve the performance of data retrieval. To find which item in the cache can be evicted and replaced, cache replacement algorithms are used. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
175
Optimal Trajectory and Positioning of UAVs for Small Cell HetNets: Geometrical Analysis and Reinforcement Learning Approach
منشور في 2023"…To this end, we first characterize a detailed three-dimensional (3D) modeling of the dynamic UAV-assisted HetNet, by taking into account the random positions of small cell base stations (SBSs), spatial angles between THz links, real antenna pattern, and UAV’s vibrations in the 3D space. …"
-
176
PROVOKE: Toxicity trigger detection in conversations from the top 100 subreddits
منشور في 2022"…Therefore, in this study, we find the turning points (i.e., toxicity triggers) making conversations toxic. …"
-
177
Impacts of Feeder Reconfiguration on Renewable Resources Allocation in Balanced and Unbalanced Distribution Systems
منشور في 2016"…The proposed method, which is based on a genetic algorithm, takes into consideration the uncertainty related to renewable distributed generation output power and the load variability. …"
احصل على النص الكامل
article -
178
A new method of analysis for slender columns
منشور في 1991"…This paper presents a simple new method to calculate column-interaction diagrams, which takes into account slenderness effects. The method consists of a simple incremental-loading algorithm that traces the load-deflection curve at constant eccentricity of the axial load. …"
احصل على النص الكامل
احصل على النص الكامل
article -
179
Anomaly Detection Based Framework for Profile Monitoring
منشور في 2023احصل على النص الكامل
doctoralThesis -
180
User-centric strategies for resource management in heterogeneous wireless networks with QoS considerations
منشور في 2017"…Due to the complexity of the problem, we design sub-optimal hierarchical tree-based algorithms for real-time operation taking into account realistic constraints. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis