Results 1 to 10 of about 305,625 (281)
Greedy Firefly Algorithm for Optimizing Job Scheduling in IoT Grid Computing
The Internet of Things (IoT) is defined as interconnected digital and mechanical devices with intelligent and interactive data transmission features over a defined network.
Adil Yousif +6 more
doaj +1 more source
Finding Hierarchical Structures of Disordered Systems: An Application for Market Basket Analysis
Complex systems can be characterized by their level of order or disorder. An ordered system is related to the presence of system properties that are correlated with each other.
Mauricio A. Valle, Gonzalo A. Ruz
doaj +1 more source
Multi-greedy geographic packets forwarding using flow-based indicators [PDF]
The MANET packet routing method of geographic greedy forwarding involves the selection of distance reducing intermediate relays towards a destination.
G. Oladeji-Atanda, D. Mpoeleng, F. Ogwu
doaj +1 more source
A Surprisal-Based Greedy Heuristic for the Set Covering Problem
In this paper we exploit concepts from Information Theory to improve the classical Chvatal greedy algorithm for the set covering problem. In particular, we develop a new greedy procedure, called Surprisal-Based Greedy Heuristic (SBH), incorporating the ...
Tommaso Adamo +3 more
doaj +1 more source
A Local PSO-Based Algorithm for Cooperative Multi-UAV Pollution Source Localization
Recently, air pollution has grown significantly, and it can frequently be challenging to identify the sources of contaminants. This article studies the deployment of multi-cooperative unmanned aerial vehicles (UAVs) to look for sources of pollution in an
Hassan Saadaoui, Faissal El Bouanani
doaj +1 more source
In this work, we seek to design a model that contributes to the study and resolution of a multi-objective rescheduling problem in dynamic permutation flow shop contexts.
Pablo Valledor +3 more
doaj +1 more source
The influence of software protection on various information systems is analyzed. Using set theory, the use of computational resources for the joint solution of direct tasks and information protection tasks in an automated system is described.
Maxim S. Gnutov, Alexander B. Sizonenko
doaj +1 more source
OTA testing of near‐field and far‐field communication links
In this work, near‐field and far‐field link measurement in metal enclosure environment is performed. The performance of near‐field and far‐field links are assessed using key performance indicators such as error vector magnitude, bit error rate, and ...
B. Korunur Engiz +3 more
doaj +1 more source
Characterizing the topology of MANETs provides the means for packet routing protocols to perform adaptively and efficiently in the particular environments.
G. Oladeji-Atanda, D. Mpoeleng
doaj +1 more source
Approximation Properties of the Vector Weak Rescaled Pure Greedy Algorithm
We first study the error performances of the Vector Weak Rescaled Pure Greedy Algorithm for simultaneous approximation with respect to a dictionary D in a Hilbert space.
Xu Xu +3 more
doaj +1 more source

