يعرض 121 - 140 نتائج من 213 نتيجة بحث عن '(( elements method algorithm ) OR ((( data scheduling algorithm ) OR ( tools using algorithm ))))', وقت الاستعلام: 0.12s تنقيح النتائج
  1. 121
  2. 122

    Evacuation of a highly congested urban city حسب El Khoury, John

    منشور في 2017
    "…The algorithm uses Dijkstras algorithm to find the shortest path(s) and a modified greedy algorithm to assign maximum flows to selected paths given a specific schedule per time interval. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  3. 123

    Analysis of Using Machine Learning to Enhance the Efficiency of Facilities Management in the UAE حسب ULLAH, SAAD

    منشور في 2022
    "…This study addresses these issues by Implementing Machine Learning (ML) algorithms using data from Building Management Systems (BMS) and FM maintenance reports, focussing on predictive maintenance for Fresh Air Handling Units. …"
    احصل على النص الكامل
  4. 124

    Communications in electronic textile systems حسب Nakad, Z.

    منشور في 2017
    "…Abstract- Electronic textiles (e-textiles) are emerging as a novel method for constructing electronic systems in wearable and large area applications. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  5. 125
  6. 126

    A modified coronavirus herd immunity optimizer for capacitated vehicle routing problem حسب Abu Zitar, Raed

    منشور في 2021
    "…Moreover, the results achieved by modified CHIOare compared against the results of other 13 well-regarded algorithms. For the first data set, the modifiedCHIO is able to gain the same results as the other comparative methods in two out of ten instances andacceptable results in the rest. …"
    احصل على النص الكامل
  7. 127

    FoGMatch حسب Arisdakessian, Sarhad

    منشور في 2019
    "…Simulation results reveal that our solution outperforms the two common scheduling algorithms (i.e., Min-Min and Max-Min) in terms of IoT services execution makespan, fog nodes resource utilization efficiency and execution time.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  8. 128
  9. 129
  10. 130

    Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology حسب Al-Hemairy, Moh'd Hussain

    منشور في 2010
    "…For instance, what so called the Man-in-the-Middle attack [MiM] and denial of services [DoS] are just some ways of vulnerable attacks to TCP/IP networks, using some tools available free on the internet. …"
    احصل على النص الكامل
  11. 131
  12. 132

    Decomposition-based wind power forecasting models and their boundary issue: An in-depth review and comprehensive discussion on potential solutions حسب Yinsong Chen (16685508)

    منشور في 2022
    "…These methods generally disaggregate the original time series data into sub-time-series with better stationarity, and then the target data is predicted based on the sub-series. …"
  13. 133

    An integrated partitioning and synthesis system for dynamically reconfigurable Multi-FPGA architectures حسب Ouaiss, Iyad

    منشور في 2017
    "…This paper presents an overview of SPARCS and the various algorithms used in the system, along with a brief description of how a JPEG-like image compression algorithm is mapped to a Multi-FPGA board using SPARCS.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  14. 134
  15. 135

    Uplink Noma in UAV-Assisted IoT Networks حسب Mrad, Ali

    منشور في 2022
    "…The first part of the thesis considers the problem of data collection from time-constrained IoT devices through deploying a UAV with uplink NOMA. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  16. 136

    Design and implementation of a deep learning-empowered m-Health application حسب Akhan Akbulut (17380285)

    منشور في 2023
    "…Later, the web service classifies using the pre-trained model built based on a deep learning algorithm. …"
  17. 137

    The Effects of Data Mining on Small Businesses in Dubai حسب AlMutawa, Rasha

    منشور في 2011
    "…While there are numerous studies on the best data mining models and their uses, even on certain industries, this study focuses on the applications more than the algorithms and models and their usefulness for small businesses specifically. …"
    احصل على النص الكامل
  18. 138

    An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation حسب El-Maleh, Aiman H.

    منشور في 2001
    "…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
    احصل على النص الكامل
    article
  19. 139

    An evolutionary meta-heuristic for state justification insequential automatic test pattern generation حسب El-Maleh, A.H.

    منشور في 2001
    "…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 140

    Blockchain-Based Decentralized Architecture for Software Version Control حسب Muhammad Hammad (17541570)

    منشور في 2023
    "…<p dir="ltr">Version control is an important component of configuration management, and most enterprise-level software uses different tools and technologies to manage the software version control such as CVS, Subversion, or Perforce. …"