Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
spatial modeling » statistical modeling (Expand Search)
Showing 241 - 250 results of 250 for search '(( elements method algorithm ) OR ((( spatial modeling algorithm ) OR ( solved based algorithm ))))', query time: 0.11s Refine Results
  1. 241

    Scatter search technique for exam timetabling by Mansour, Nashat

    Published 2011
    “…This approach is based on maintaining and evolving a population of solutions. …”
    Get full text
    Get full text
    Get full text
    article
  2. 242

    Industrial Internet of Things enabled technologies, challenges, and future directions by Shams Forruque, Ahmed

    Published 2023
    “…For instance, fog computing reduces parking, platform, fuel, and CO2 emissions. A blockchain-based security framework for the cement sector can resolve 51% of security issues and Sybil attacks caused by consensus algorithms like Proof of Work (PoW). …”
    Get full text
    Get full text
    Get full text
    article
  3. 243

    Design and Analysis of Lightweight Authentication Protocol for Securing IoD by Saeed Ullah Jan (9079260)

    Published 2021
    “…We proposed a hash message authentication code/secure hash algorithmic (HMACSHA1) based robust, improved and lightweight authentication protocol for securing IoD. …”
  4. 244

    Traffic Offloading with Channel Allocation in Cache-Enabled Ultra-Dense Wireless Networks by Abbas, Nadine

    Published 2018
    “…We also propose efficient sub-optimal hierarchical tree-based algorithms that operate in real time with dynamic and fast solutions for ultra dense networks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 245

    Industrial Internet of Things enabled technologies, challenges, and future directions by Shams Forruque Ahmed (16517712)

    Published 2023
    “…For instance, fog computing reduces parking, platform, fuel, and CO<sub>2</sub> emissions. A blockchain-based security framework for the cement sector can resolve 51% of security issues and Sybil attacks caused by consensus algorithms like Proof of Work (PoW). …”
  6. 246

    Modelling of pollutant transport in compound open channels by Chatila, Jean Georges

    Published 1998
    “…Derivation of the basic differential equations is based on the Navier-Stokes equations of continuity and fluid motion, in addition to the convection-dispersion equation. …”
    Get full text
    Get full text
    masterThesis
  7. 247
  8. 248

    DASSI: differential architecture search for splice identification from DNA sequences by Shabir Moosa (14153316)

    Published 2022
    “…The demand for robust algorithms over the recent years has brought huge success in the field of Deep Learning (DL) in solving many difficult tasks in image, speech and natural language processing by automating the manual process of architecture design. …”
  9. 249
  10. 250