Search alternatives:
processing algorithm » processing algorithms (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
waste processing » image processing (Expand Search), text processing (Expand Search), melt processing (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
level modeling » event modeling (Expand Search)
processing algorithm » processing algorithms (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
waste processing » image processing (Expand Search), text processing (Expand Search), melt processing (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
level modeling » event modeling (Expand Search)
-
101
A GRASP Approach for Solving Large-Scale Electric Bus Scheduling Problems
Published 2021“…In this paper, the focus is on the problem of optimal scheduling of an electric bus (EB) fleet to cover a public transport timetable. The problem is modelled using a mixed integer program (MIP) in which the charging time of an EB is pertinent to the battery’s state-of-charge level. …”
-
102
Thermodynamic Analysis and Optimization of Densely-Packed Receiver Assembly Components in High-Concentration CPVT Solar Collectors
Published 2016“…However, accurate design models and clear simulation algorithms on the component-level are critical for the proper system-level engineering and evaluation of CPVT collectors. …”
Get full text
article -
103
Integration of Textural and Material Information into BIM Using Spectrometry and Infrared Sensing
Published 2015Get full text
doctoralThesis -
104
UML-based regression testing for OO software
Published 2010“…For the second phase, we present algorithms for detecting system level changes in the interaction overview diagram. …”
Get full text
Get full text
Get full text
article -
105
Degree-Based Network Anonymization
Published 2020“…In this thesis, we study a new multi- objective parameterized anonymization approach that generalizes the known degree anonymization problem and attempts at improving it as a more realistic model for data security/privacy. Our model suggests a convenient privacy level for each net- work based on the standard deviation of its degrees. …”
Get full text
Get full text
Get full text
masterThesis -
106
An automated temporal partitioning tool for a class of DSP applications
Published 1998“…We present an automated temporal partitioning tool for developing dynamical ly recon gurable designs starting from behavior level speci cations for a class of dsp applications. …”
Get full text
Get full text
Get full text
conferenceObject -
107
Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone
Published 2021“…This risk is specifically eminent in monitoring data transmission traffic, espionage, troop movement, border surveillance, searching, and warfare battlefield phenomenon, etc. …”
-
108
-
109
An automated temporal partitioning and loop fission approach for FPGA based reconfigurable synthesis of DSP applications
Published 2017“…We present an automated temporal partitioning and loop transformation approach for developing dynamically reconfigurable designs starting from behavior level specifications. An Integer Linear Programming (ILP) model is formulated to achieve near-optimal latency designs. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
110
Joint BS Assignment and End-to-End Scheduling for Wireless Cellular Networks with Heterogeneous Services
Published 2010“…Moreover, we extend the system model to include heterogeneous services with varying quality parameters. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
111
Assessment of Inventory and Transportation Collaboration in a Logistics Marketplace
Published 2020Get full text
doctoralThesis -
112
Modelling Exchange Rates during Currency Crisis using Neural Networks
Published 2006“…The models are built using the feedforward ANN structure trained by the backpropagation algorithm. Exchange rate data from the Lebanese currency crisis period of 1985-1992 is used for training, testing and evaluation of the models. …”
Get full text
Get full text
Get full text
conferenceObject -
113
-
114
Data redundancy management for leaf-edges in connected environments
Published 2022“…To address these limitations, we propose here DRMF: Data Redundancy Management for leaF-edges allowing to identify and remove data redundancies in connected environments at the device level. DRMF considers both static and mobile edge devices, and provides two algorithms for temporal and spatio-temporal redundancy detection. …”
Get full text
Get full text
Get full text
Get full text
article -
115
A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security
Published 2023“…However, it limits the critical problems of high time complexity, computational cost, difficulty to understand, and reduced level of security. Therefore, the proposed work intends to implement a group of novel methodologies for developing an effective Cyborg intelligence security model to secure smart city systems. …”
-
116
C-3PA: Streaming Conformance, Confidence and Completeness in Prefix-Alignments
Published 2023“…This paper introduces a novel approximate streaming conformance checking algorithm that enriches prefix-alignments with confidence and completeness measures. …”
Get full text
Get full text
Get full text
-
117
A simple approach for testing web service based applications
Published 2005“…In our technique, a web application and its composed components are specified by a two-level abstract model. The web application is represented as Task Precedence Graph (TPG) and the behavior of the composed components is represented as a Timed Labeled Transition System (TLTS). …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
118
SemIndex+: A semantic indexing scheme for structured, unstructured, and partly structured data
Published 2018“…Various weighting functions and a parallelized search algorithm have been developed for that purpose and are presented here. …”
Get full text
Get full text
Get full text
Get full text
article -
119
Oversampling techniques for imbalanced data in regression
Published 2024“…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …”
-
120
Blockchain-Based Decentralized Architecture for Software Version Control
Published 2023“…<p dir="ltr">Version control is an important component of configuration management, and most enterprise-level software uses different tools and technologies to manage the software version control such as CVS, Subversion, or Perforce. …”