بدائل البحث:
storage optimization » swarm optimization (توسيع البحث), global optimization (توسيع البحث), whale optimization (توسيع البحث)
storage optimization » swarm optimization (توسيع البحث), global optimization (توسيع البحث), whale optimization (توسيع البحث)
-
41
-
42
Autonomous Demand-Side Management in the Future Smart Grid
منشور في 2016احصل على النص الكامل
doctoralThesis -
43
Design and analysis of entropy-constrained reflected residual vector quantization
منشور في 2002"…Residual vector quantization (RVQ) is a vector quantization (VQ) paradigm which imposes structural constraints on the encoder in order to reduce the encoding search burden and memory storage requirements of an unconstrained VQ. Jointly optimized RVQ (JORVQ) is an effective design algorithm for minimizing the overall quantization error. …"
احصل على النص الكامل
احصل على النص الكامل
article -
44
Spacecraft spin axis attitude determination
منشور في 1992"…The results show a tradeoff between estimation accuracy and computational requirements. One algorithm is about three times more accurate than the other and is therefore recommended even though it requires about 20% more in computer storage and operations, and about 50% more in central processing unit time…"
احصل على النص الكامل
احصل على النص الكامل
article -
45
Practical single node failure recovery using fractional repetition codes in data centers
منشور في 2016"…Node failures in distributed storage systems are becoming a critical issue, and many erasure codes are designed to handle such failures. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
46
A Hardware Model of an Expandable RSA Cryptogrsphic System
منشور في 1998"…Data security is an important aspect of information transmission and storage in an electronic form. Cryptographic systems are used to encrypt such information to guarantee its security. …"
احصل على النص الكامل
masterThesis -
47
Hardware Model of an Expandable RSA Cryptographic System
منشور في 1998"…Data security is an important aspect of information transmission and storage in an electronic form. Cryptographic systems are used to encrypt such information to guarantee its security. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
48
Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks
منشور في 2022"…Within this context, the problem is modelled as a closed queueing network (CQN) combined with mixed-integer nonlinear programming (MINLP) to determine the optimal fleet size. This study proposes an analytical method based on sequential quadratic programming (SQP) methodology coupled with a mean value analysis (MVA) algorithm to solve this NP-Hard problem. …"
-
49
FoGMatch
منشور في 2019"…Our solution consists of (1) two optimization problems, one for the IoT devices and one for the fog nodes, (2) preference functions for both the IoT and fog layers to help them rank each other on the basis of several criteria such latency and resource utilization, and (3) centralized and distributed intelligent scheduling algorithms that consider the preferences of both the fog and IoT layers to improve the performance of the overall IoT ecosystem. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
50
Electric Vehicles Charging Station Load Forecasting Integration With Renewable Energy Using Novel Deep EfficientBiLSTMNet
منشور في 2025"…The model’s hyperparameters are optimized using an Enhanced Firefly Algorithm (EFA). …"
-
51
Hybrid deep learning based threat intelligence framework for Industrial IoT systems
منشور في 2025"…The proposed approach was also compared against several contemporary deep learning-based architectures and existing benchmark algorithms. The results indicate that the proposed method achieves superior detection accuracy, with only a minimal compromise in speed efficiency. …"