بدائل البحث:
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
presented » present (توسيع البحث)
element » elements (توسيع البحث)
coding algorithm » cosine algorithm (توسيع البحث), colony algorithm (توسيع البحث), scheduling algorithm (توسيع البحث)
using algorithm » cosine algorithm (توسيع البحث)
presented » present (توسيع البحث)
element » elements (توسيع البحث)
-
461
Activity-level space scheduling
منشور في 1992"…An interactive and graphical decision-support tool, named MovePlan, is presented to assist in space scheduling. Its output layouts can be used to refine individual robot's trajectories using traditional path-planning algorithms.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
462
RHEEMix in the data jungle: a cost-based optimizer for cross-platform systems.
منشور في 2020"…We show that our optimizer can perform tasks more than one order of magnitude faster when using multiple platforms than when using a single platform.…"
-
463
Information Warfare
منشور في 2015"…The algorithm is based on data dependency and uses a single matrix that will be later used during recovery.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
464
-
465
-
466
-
467
Fragment-based computational protein structure prediction
منشور في 2014احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
468
On sensor selection in mobile devices based on energy, application accuracy, and context metrics
منشور في 2013"…We use this algorithm to build a sensor selection model to choose among location sensors. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
469
De-Linkability
منشور في 2013"…In this paper, we propose de-linkability, a privacy-preserving constraint to bound the amount of information outsourced that can be used to re-identify the individual. We also provide a sanitizing MD*-algorithm to enforce de-linkability and present a set of experiments to demonstrate its efficiency.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
470
Building power consumption datasets: Survey, taxonomy and future directions
منشور في 2020"…Accordingly, a novel visualization strategy based on using power consumption micro-moments has been presented along with an example of deploying machine learning algorithms to classify the micro-moment classes and identify anomalous power usage.…"
-
471
-
472
A comparative study of regression testing methods. (c1996)
منشور في 1996احصل على النص الكامل
احصل على النص الكامل
masterThesis -
473
K Nearest Neighbor OveRsampling approach: An open source python package for data augmentation
منشور في 2022"…<p>Data is present in abundance, but the problem of imbalanced dataset crops up time and again, vexing classifiers and reducing accuracy. …"
-
474
Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review
منشور في 2023"…In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. …"
-
475
The architecture of a highly reconfigurable RISC dataflow array processor
منشور في 2020"…The array can be programmed to execute arbitrary algorithms in both static and dynamic manner. The processor array is modelled at the behavioural level in VHDl. …"
احصل على النص الكامل
article -
476
Predicting Calcein Release from Ultrasound-Targeted Liposomes: A Comparative Analysis of Random Forest and Support Vector Machine
منشور في 2024"…The type of algorithm employed to predict drug release from liposomes plays an important role in affecting the accuracy. …"
احصل على النص الكامل
article -
477
Real-Time Implementation of GPS Aided Low Cost Strapdown Inertial Navigation System
منشور في 2009احصل على النص الكامل
doctoralThesis -
478
Impact of fuzzy volume fraction on unsteady stagnation-point flow and heat transfer of a third-grade fuzzy hybrid nanofluid over a permeable shrinking/stretching sheet
منشور في 2024"…Non-linear coupled partial differential equations (PDEs) get transformed into ordinary differential equations (ODEs) using an effective similarity transformation. After that, the ODEs are numerically solved using the bvp4c algorithm. …"
-
479
-
480
A Blockchain Model for Secure Communications in Internet of Vehicles
منشور في 2021"…Secure data communication is vital to the success and stability of the IoV and should be integrated into its various operations and aspects. In this paper, we present a framework for secure IoV communications by utilizing the High Performance Blockchain Consensus (HPBC) algorithm. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject