標題: Titlebook: Innovations in Smart Cities Applications Volume 7; The Proceedings of t Mohamed Ben Ahmed,Anouar Abdelhakim Boudhir,?smail Conference proce [打印本頁] 作者: Spring 時間: 2025-3-21 16:43
書目名稱Innovations in Smart Cities Applications Volume 7影響因子(影響力)
書目名稱Innovations in Smart Cities Applications Volume 7影響因子(影響力)學科排名
書目名稱Innovations in Smart Cities Applications Volume 7網(wǎng)絡公開度
書目名稱Innovations in Smart Cities Applications Volume 7網(wǎng)絡公開度學科排名
書目名稱Innovations in Smart Cities Applications Volume 7被引頻次
書目名稱Innovations in Smart Cities Applications Volume 7被引頻次學科排名
書目名稱Innovations in Smart Cities Applications Volume 7年度引用
書目名稱Innovations in Smart Cities Applications Volume 7年度引用學科排名
書目名稱Innovations in Smart Cities Applications Volume 7讀者反饋
書目名稱Innovations in Smart Cities Applications Volume 7讀者反饋學科排名
作者: AORTA 時間: 2025-3-21 22:12 作者: 值得 時間: 2025-3-22 02:29
Khaoula Taji,Yassine Taleb Ahmad,Fadoua Ghanimierance. One of the methods typically used to validate fault tolerance mechanisms is fault injection. The idea is to study the behavior of the system in presence of faults in order to determine whether the system behaves properly or not. Software-implemented fault injection (SWIFI) techniques enable 作者: GROVE 時間: 2025-3-22 08:05 作者: 原告 時間: 2025-3-22 11:15
Kamal Elhattab,Karim Abouelmehdi,Abdelmajid Elmoutaouakkil,Said Elatarlous state. This is in contrast with continuous feedback systems where wrong outputs can only gradually deviate the system under control from its intended set point. Transient errors may even be filtered by the latency inherent to the physical application. In this paper we extend our previous experi作者: CLEAR 時間: 2025-3-22 14:20 作者: ascend 時間: 2025-3-22 17:05 作者: Complement 時間: 2025-3-22 22:51 作者: 芳香一點 時間: 2025-3-23 01:33 作者: 大方不好 時間: 2025-3-23 06:24
Karim Seridi,Abdessamad El Rharrasce in such environments is an increasingly critical aspect, especially in terms of fault recovery, as containerization-based microservices are becoming the de facto standard for soft real-time and cyber-physical workloads in edge computing..The Worst Case Execution Time (WCET) of platform-supported 作者: CURT 時間: 2025-3-23 13:03
Yahya El Gaoual,Mohamed Hanines, where everything is connected and interact with each other. A Digital Twin of the Organization (DTO) exploits these infrastructures to provide an accurate digital representation of the organization. Beyond the usual representation of devices, machines and physical assets supplied by Digital Twins作者: muster 時間: 2025-3-23 15:19
Siham Akil,Sara Sekkate,Abdellah Adibs, where everything is connected and interact with each other. A Digital Twin of the Organization (DTO) exploits these infrastructures to provide an accurate digital representation of the organization. Beyond the usual representation of devices, machines and physical assets supplied by Digital Twins作者: 者變 時間: 2025-3-23 18:36 作者: hematuria 時間: 2025-3-24 01:15
Imen Mejri,Manel Grari,Safa Bhar Layeb. One of the characteristic features of such systems is dynamic reconfiguration, which facilitates emergent behavior to respond to internal variations as well as to environmental changes. By means of cooperation, systems of systems can achieve greater efficiency regarding fulfillment of their goals.作者: 悠然 時間: 2025-3-24 02:42
Mohsine El Khayati,Ismail Kich,Youssfi Elkettanievent total grid failures. There are different approaches to detect these faults, and also to determine or limit their geographical positions, in order to enable a quick elimination of the cause and thus to restore a stable network condition. To this end, an ICT system assisting fast localization is作者: 令人苦惱 時間: 2025-3-24 09:13 作者: 冷漠 時間: 2025-3-24 12:00 作者: 山崩 時間: 2025-3-24 15:19 作者: 結果 時間: 2025-3-24 19:50 作者: esoteric 時間: 2025-3-25 03:00
Zhiyu Zheng,Esma Yahia,Elham Farazdaghi,Rani El Meouche,Fakhreddine Ababsa,Patrick Beguerystems, however, implementing capabilities can be considerably more difficult. Two problems stand out: (1) how to communicate information about capabilities across an insecure communication network, and (2) how to revoke capabilities in the presence of failures such as message delays, crashes, and ne作者: byline 時間: 2025-3-25 07:18 作者: acquisition 時間: 2025-3-25 10:16
Water Amount Prediction for?Smart Irrigation Based on?Machine Learning Techniqueswithout wastage. In this paper, we proposed a smart irrigation solution using different Machine Learning (ML) models to predict the daily irrigation water amount for the cucumber crop. The various used ML takes the plant’s environmental conditions parameters as input to predict the suitable amount o作者: MAIZE 時間: 2025-3-25 14:36
Smart Irrigation System Using Low Energyention. The development of new intelligent systems in the field of agriculture has strengthened agricultural production, made it an altarpiece and reduced the cost of production. The purpose of this article is to realize a new fully autonomous model capable of functioning correctly in the agricultur作者: Cpr951 時間: 2025-3-25 18:59
Advancing Crop Recommendation Systems Through Ensemble Learning Techniquesp recommendation that leverages machine learning techniques, specifically ensemble learning with a voting classifier. A comprehensive analysis of prior research in the field of crop recommendation systems reveals the limitations and challenges of previous approaches, particularly their low accuracy.作者: Halfhearted 時間: 2025-3-25 20:53
Technology to Build Architecture: Application of Adaptive Facade on a New Multifunctional Arena behaviour of indoor environment and the global comfort of a building are strictly dependent on the fa?ade: traditional fa?ades behave statically towards external and internal climate conditions. The objective of this study is to design an adaptive facade system with different layer functions, ensur作者: Amorous 時間: 2025-3-26 02:22 作者: NICE 時間: 2025-3-26 06:27
A Comparative Analysis of Memory-Based and Model-Based Collaborative Filtering on Recommender Systemapplications adopting this model pushes companies to develop differentiation strategies. One of the strategies is to use emerging technologies to offer a better customer experience. Recommender systems (RSs) are AI-based solutions that can provide customized recommendations. To implement an RS in a 作者: 靈敏 時間: 2025-3-26 12:07
Critical Overview of?Model Driven Engineeringtrong focus on using models to represent the various facets of a software system. These models serve as the foundation for creating executable code. Even though MDE has proved effective in some situations, there are still difficulties with the method, such as the difficulty of modeling specific syst作者: Limerick 時間: 2025-3-26 13:10
A Synthesis on?Machine Learning for?Credit Scoring: A Technical Guideselection of an appropriate algorithm to be used in a particular application can be challenging due to the complexity of the various techniques that are available as well as the high cost of implementing and debugging sophisticated models. In this paper, we examine the use of multiple machine learni作者: Increment 時間: 2025-3-26 17:59
Enhancing Writer Identification with?Local Gradient Histogram Analysison, and historical research. In this article, we propose a novel approach for writer identification using gradient angle histograms collected from neighboring pixels. By calculating the histogram of gradient angles from different locations of neighboring pixels, we effectively capture the writer’s u作者: 顯微鏡 時間: 2025-3-26 22:39 作者: EXCEL 時間: 2025-3-27 02:33
Isolated Handwritten Arabic Character Recognition Using Convolutional Neural Networks: An Overviewritten Arabic Characters (IHAC) is a crucial phase in AHR, and significant progress has been made in recent years, primarily due to the adoption of Convolutional Neural Networks (CNN). CNN has emerged as a powerful learning technique, dominating various computer vision-related research domains. Nota作者: FADE 時間: 2025-3-27 05:25 作者: 討人喜歡 時間: 2025-3-27 13:30 作者: Curmudgeon 時間: 2025-3-27 14:28 作者: 多嘴 時間: 2025-3-27 18:59 作者: tangle 時間: 2025-3-28 02:00 作者: 滲入 時間: 2025-3-28 03:49 作者: 周年紀念日 時間: 2025-3-28 09:54 作者: Exhilarate 時間: 2025-3-28 13:03 作者: 熟練 時間: 2025-3-28 18:21
A Synthesis on?Machine Learning for?Credit Scoring: A Technical Guideurate and effective model based on the overall obtained performance. Our results suggest that XGBoost Classifier, Bagging Classifier, and Support Vector Machine are among the most effective models that can be used for this task based on their superior accuracy when compared to other machine learning作者: 咯咯笑 時間: 2025-3-28 22:14 作者: 新鮮 時間: 2025-3-29 00:24 作者: jealousy 時間: 2025-3-29 06:18 作者: anthropologist 時間: 2025-3-29 09:55 作者: Electrolysis 時間: 2025-3-29 11:36
l-active approach. However, a request that exposes faults among the . replicas will incur a higher latency than the all-active approach mainly due to fault detection latency. Under such conditions, the protocol switches to a recovery mode, in which all 2. + 1 replicas execute the request and send th作者: 釋放 時間: 2025-3-29 17:25
Khaoula Taji,Yassine Taleb Ahmad,Fadoua Ghanimion-chip) applications. The technique exploits the features of a standard debugging interface for embedded systems, called Nexus, in order to inject faults without temporal overhead. Then, Nexus features are also exploited in order to observe, without spatial intrusion, the behavior of the target sys作者: antiandrogen 時間: 2025-3-29 21:29
Hamed Laouz,Soheyb Ayad,Labib Sadek Terrissa,M’hamed Mancer attacks are considered from an analysis of use cases. Then the rights of the users are defined from the use cases using a Role-Based Access Control (RBAC) or other security model. The attacks are used to define the policies that could stop them. The rights are reflected in the conceptual class mode作者: 防銹 時間: 2025-3-30 00:42
Kamal Elhattab,Karim Abouelmehdi,Abdelmajid Elmoutaouakkil,Said Elatartrol problem is used as testbed for experimental evaluation by fault-injection in the controller. The main contribution of this paper is to present experimental data showing that effectively the fail-bounded model can be applied to discrete applications whenever a continuous physical system exists i作者: 和平主義者 時間: 2025-3-30 04:59 作者: Thrombolysis 時間: 2025-3-30 09:07 作者: Handedness 時間: 2025-3-30 14:09
Alessandra Annibale,Emily Chiesa,Giulia Prelli,Gabriele Masera,Andrea Kindinis,Arnaud Lapertot,Davidbabilistic Timing Analysis (MBPTA) aims at estimating the Worst-Case Execution Time (WCET) based on measurements. A technique in the MBPTA “toolbox”, Extreme Value Analysis (EVA) is a statistical paradigm dealing with approximating the properties of extremely deviant values..This paper demonstrates 作者: 外向者 時間: 2025-3-30 17:22 作者: 過度 時間: 2025-3-31 00:19 作者: 榨取 時間: 2025-3-31 04:53 作者: Explosive 時間: 2025-3-31 07:49 作者: 惡心 時間: 2025-3-31 10:37 作者: Neonatal 時間: 2025-3-31 16:49