بدائل البحث:
code encryption » secure encryption (توسيع البحث)
code selection » gene selection (توسيع البحث)
node selection » gene selection (توسيع البحث)
يعرض 1 - 20 نتائج من 27 نتيجة بحث عن '(( ((code selection) OR (node selection)) algorithm ) OR ( code encryption algorithm ))', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 1
  2. 2

    UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data حسب Behrouz Ahadzadeh (19757022)

    منشور في 2024
    "…To overcome these challenges, a new FS algorithm named Uniform-solution-driven Binary Feature Selection (UniBFS) has been developed in this study. …"
  3. 3

    Minimum traffic inter-BS SHO boundary selection algorithm for CDMA-based wireless networks حسب Abu-Amara, M.

    منشور في 2004
    "…An algorithm is presented to select an inter-base station soft handoff (inter-BS SHO) boundary for code division multiple access (CDMA)-based wireless networks. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 4

    Exploiting Sparsity in Amplify-and-Forward Broadband Multiple Relay Selection حسب Ala Gouissem (7006463)

    منشور في 2019
    "…In particular, by separating all the subcarriers or some subcarrier groups from each other and by optimizing the selection and beamforming vector(s) using OMP algorithm, a higher level of frequency diversity can be achieved. …"
  5. 5

    Dynamic single node failure recovery in distributed storage systems حسب Itani, M.

    منشور في 2017
    "…We selected fractional repetition coding due to its simple repair mechanism that minimizes the repair and disk access bandwidths together with the property of un-coded repair process. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 6

    A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks حسب Umesh Kumar Lilhore (17727684)

    منشور في 2022
    "…In the proposed energy-efficient routing protocol, an enhanced cluster head node is used to select a strategy that can analyze the remaining energy and directions of each participating node. …"
  7. 7
  8. 8

    Large language models for code completion: A systematic literature review حسب Rasha Ahmad Husein (19744756)

    منشور في 2024
    "…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …"
  9. 9

    Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators حسب Abu Zitar, Raed

    منشور في 2021
    "…DNA microarray technology is the fabrication of a single chip to contain a thousand genetic codes. Each microarray experiment can analyze many thousands of genes in parallel. …"
    احصل على النص الكامل
  10. 10
  11. 11

    MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks حسب Artail, Hassan

    منشور في 2009
    "…This paper introduces a message forwarding algorithm for search applications within mobile ad hoc networks that is based on the concept of selecting the nearest node from a set of designated nodes. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  12. 12
  13. 13

    A cluster-based model for QoS-OLSR protocol حسب Otrok, Hadi

    منشور في 2017
    "…Therefore, we propose a novel clustering algorithm and a relay node selection based on different combinations of metrics, such as connectivity, residual energy, and bandwidth. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  14. 14

    The bus sightseeing problem حسب Qian Hu (205735)

    منشور في 2023
    "…Significant research focus has been directed toward profitable routing variants due to the practical importance of their applications and their interesting structure, which jointly optimizes node selection and routing decisions. Profitable routing applications arise in the tourism industry aiming to maximize the profit score of attractions visited within a limited time period. …"
  15. 15

    COMPUTER AIDED PROGRAMMING EDUCATION (CAPE) حسب Al-Sukairi, Abdallah

    منشور في 2020
    "…CAPE consists of problem definition and algorithm construction modules. Algorithm construction module is currently supported with a facility to map an algorithm(s) into FORTRAN or Pascal code. …"
    احصل على النص الكامل
    article
  16. 16

    UML-based regression testing for OO software حسب Mansour, Nashat

    منشور في 2010
    "…Previous techniques have been mainly code-based and several of them have addressed procedural programs. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  17. 17

    A degree-based heuristic for strongly connected dominating-absorbent sets in wireless ad-hoc networks حسب Abu-Khzam, Faisal N.

    منشور في 2017
    "…We introduce a hybrid heuristic for this problem, in which we combine low-degree vertex elimination and high-degree vertex selection. This simple and efficient method yields very promising experimental results, outperforming known heuristic algorithms.…"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  18. 18
  19. 19

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying حسب Tekli, Joe

    منشور في 2023
    "…We use a semantic-aware inverted index to allow semantic-aware search, result selection, and result ranking functionality. The semantically augmented XML data tree is processed for structural node clustering, based on semantic query concepts (i.e., key-concepts), in order to identify and rank candidate answer sub-trees containing related occurrences of query key-concepts. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  20. 20

    DSDM: A Distributed Service Discovery Model for Manets حسب Artail, Hassan

    منشور في 2008
    "…This model is built on top of the network layer of the TCP/IP stack and benefits from the up-to-date routing information enabled by proactive routing protocols that attempt to keep the information in the routing tables of the mobile nodes current. The designed system is based on storing service descriptions in selected nodes that are searched in accordance to a proposed Minimum Distance Packet Forwarding (MDPF) algorithm. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article