بدائل البحث:
method algorithm » mould algorithm (توسيع البحث)
data scheduling » task scheduling (توسيع البحث), ahead scheduling (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
tools using » tool using (توسيع البحث)
method algorithm » mould algorithm (توسيع البحث)
data scheduling » task scheduling (توسيع البحث), ahead scheduling (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
tools using » tool using (توسيع البحث)
-
121
Machine Learning-Based Approach for EV Charging Behavior
منشور في 2021احصل على النص الكامل
doctoralThesis -
122
Evacuation of a highly congested urban city
منشور في 2017"…The algorithm uses Dijkstras algorithm to find the shortest path(s) and a modified greedy algorithm to assign maximum flows to selected paths given a specific schedule per time interval. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
123
Analysis of Using Machine Learning to Enhance the Efficiency of Facilities Management in the UAE
منشور في 2022"…This study addresses these issues by Implementing Machine Learning (ML) algorithms using data from Building Management Systems (BMS) and FM maintenance reports, focussing on predictive maintenance for Fresh Air Handling Units. …"
احصل على النص الكامل
-
124
Communications in electronic textile systems
منشور في 2017"…Abstract- Electronic textiles (e-textiles) are emerging as a novel method for constructing electronic systems in wearable and large area applications. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
125
Assigning proctors to exams using scatter search. (c2006)
منشور في 2006احصل على النص الكامل
احصل على النص الكامل
masterThesis -
126
A modified coronavirus herd immunity optimizer for capacitated vehicle routing problem
منشور في 2021"…Moreover, the results achieved by modified CHIOare compared against the results of other 13 well-regarded algorithms. For the first data set, the modifiedCHIO is able to gain the same results as the other comparative methods in two out of ten instances andacceptable results in the rest. …"
احصل على النص الكامل
-
127
FoGMatch
منشور في 2019"…Simulation results reveal that our solution outperforms the two common scheduling algorithms (i.e., Min-Min and Max-Min) in terms of IoT services execution makespan, fog nodes resource utilization efficiency and execution time.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
128
-
129
-
130
Security in wire/wireless networks: sniffing attacks prevention/detection techniques in LAN networks & the effect on biometric technology
منشور في 2010"…For instance, what so called the Man-in-the-Middle attack [MiM] and denial of services [DoS] are just some ways of vulnerable attacks to TCP/IP networks, using some tools available free on the internet. …"
احصل على النص الكامل
-
131
-
132
Decomposition-based wind power forecasting models and their boundary issue: An in-depth review and comprehensive discussion on potential solutions
منشور في 2022"…These methods generally disaggregate the original time series data into sub-time-series with better stationarity, and then the target data is predicted based on the sub-series. …"
-
133
An integrated partitioning and synthesis system for dynamically reconfigurable Multi-FPGA architectures
منشور في 2017"…This paper presents an overview of SPARCS and the various algorithms used in the system, along with a brief description of how a JPEG-like image compression algorithm is mapped to a Multi-FPGA board using SPARCS.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
134
Turbo-charging dominating set with an FPT subroutine
منشور في 2017احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
135
Uplink Noma in UAV-Assisted IoT Networks
منشور في 2022"…The first part of the thesis considers the problem of data collection from time-constrained IoT devices through deploying a UAV with uplink NOMA. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
136
Design and implementation of a deep learning-empowered m-Health application
منشور في 2023"…Later, the web service classifies using the pre-trained model built based on a deep learning algorithm. …"
-
137
The Effects of Data Mining on Small Businesses in Dubai
منشور في 2011"…While there are numerous studies on the best data mining models and their uses, even on certain industries, this study focuses on the applications more than the algorithms and models and their usefulness for small businesses specifically. …"
احصل على النص الكامل
-
138
An Evolutionary Meta-Heuristic for State Justification in Sequential Automatic Test Pattern Generation
منشور في 2001"…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
احصل على النص الكامل
article -
139
An evolutionary meta-heuristic for state justification insequential automatic test pattern generation
منشور في 2001"…In this work, we propose a hybrid approach which uses a combination of evolutionary and deterministic algorithms for state justification. A new method based on Genetic Algorithms is proposed, in which we engineer state justification sequences vector by vector. …"
احصل على النص الكامل
احصل على النص الكامل
article -
140
Blockchain-Based Decentralized Architecture for Software Version Control
منشور في 2023"…<p dir="ltr">Version control is an important component of configuration management, and most enterprise-level software uses different tools and technologies to manage the software version control such as CVS, Subversion, or Perforce. …"