يعرض 1 - 20 نتائج من 77 نتيجة بحث عن '(( elements method algorithm ) OR ((( joint scheduling algorithm ) OR ( data fitting algorithm ))))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 1

    A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks حسب Saad, Walid

    منشور في 2012
    "…In this work, we propose a utility-based joint uplink/downlink scheduling algorithm suitable for wireless services involving pairwise communication among mobile users. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 2

    Joint BS Assignment and End-to-End Scheduling for Wireless Cellular Networks with Heterogeneous Services حسب Saad, Walid

    منشور في 2010
    "…In this work, we extend the end-to-end scheduling approach by designing and evaluating a joint scheduling and BS assignment algorithm in order to further improve the system performance. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    A reduced model for phase-change problems with radiation using simplified PN approximations حسب Belhamadia, Youssef

    منشور في 2025
    "…The integro-differential equation for the full radiative transfer is replaced by a set of differential equations which are independent of the angle variable and easy to solve using conventional computational methods. To solve the coupled equations, we implement a second-order implicit scheme for the time integration and a mixed finite element method for the space discretization. …"
    احصل على النص الكامل
    article
  9. 9
  10. 10

    On end-to-end scheduling in wireless cellular networks حسب Saad, Walid

    منشور في 2008
    "…By jointly considering the time varying channel conditions in both uplink and downlink directions, the proposed end-to-end scheduling algorithm achieves an increased number of active connections and a lower packet drop in comparison to other schemes. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  11. 11

    Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study حسب Alkhodari, Mohanad Ahmed

    منشور في 2021
    "…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …"
    احصل على النص الكامل
    article
  12. 12
  13. 13
  14. 14

    Design of adaptive arrays based on element position perturbations حسب Dawoud, M.M.

    منشور في 1993
    "…The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  15. 15

    Joint Planning of Smart EV Charging Stations and DGs in Eco-Friendly Remote Hybrid Microgrids حسب Shaaban, Mostafa

    منشور في 2019
    "…An outer sub-problem determines the locations and sizes of the DG units and charging stations using a non-dominated sorting Genetic algorithm (NSGA-II). Given the allocation and sizing decisions, an inner sub-problem ensures smart, reliable, and eco-friendly operation of the microgrid by solving a non-linear scheduling problem. …"
    احصل على النص الكامل
    article
  16. 16
  17. 17

    A Micro-Economics Approach for Scheduling in CDMA Networks with End-to-End QoS Guarantees حسب Saad, Walid

    منشور في 2007
    "…To efficiently utilize the available radio resources, we propose a new scheduling algorithm based on techniques from micro-economics. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  18. 18

    A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems حسب Faria Nawshin (21841598)

    منشور في 2025
    "…<p dir="ltr">Federated Learning (FL) is gaining traction in Android-based consumer electronics, enabling collaborative model training across decentralized devices while preserving data privacy. However, the increasing adoption of FL in these devices exposes them to adversarial attacks that can compromise user data and device security. …"
  19. 19

    Bee Colony Algorithm for Proctors Assignment. حسب Mansour, Nashat

    منشور في 2015
    "…The search accomplished by three types of bees over a number of iterations aiming to find the source with the highest nectar value (fitness value of a candidate solution). We apply the Bee Colony algorithm to previously published data. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 20

    A kernelization algorithm for d-Hitting Set حسب Abu-Khzam, Faisal N.

    منشور في 2010
    "…For 3-Hitting Set, an arbitrary instance is reduced into an equivalent one that contains at most 5k2+k elements. This kernelization is an improvement over previously known methods that guarantee cubic-order kernels. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article