يعرض 1 - 20 نتائج من 86 نتيجة بحث عن '(( elements network algorithm ) OR ((( data code algorithm ) OR ( data backing algorithm ))))', وقت الاستعلام: 0.13s تنقيح النتائج
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Development of an Optimization Algorithm for Internet Data Traffic حسب Misbahuddin, Syed

    منشور في 2020
    "…The algorithm monitors data repetitions in IP datagram and prepares a compression code in response of this repetition. …"
    احصل على النص الكامل
    article
  6. 6
  7. 7

    Practical single node failure recovery using fractional repetition codes in data centers حسب Itani, May

    منشور في 2016
    "…FR codes consist of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  8. 8
  9. 9

    A FUZZY EVOLUTIONARY ALGORITHM FOR TOPOLOGY DESIGN OF CAMPUS NETWORKS حسب Youssef, H.

    منشور في 2020
    "…In this paper, we present a Simulated Evolution algorithm for the design of campus network topology. …"
    احصل على النص الكامل
    article
  10. 10

    A Parallel Neural Networks Algorithm for the Clique Partitioning Problem حسب Harmanani, Haidar M.

    منشور في 2002
    "…The proposed algorithm has a time complexity of O(1) for a neural network with n vertices and c cliques. …"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  11. 11

    A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models حسب Osama Bassam J. Rabie (21323741)

    منشور في 2024
    "…Then, the DRF optimization algorithm is applied to optimally tune the features required for accurate intrusion detection and classification. …"
  12. 12

    UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data حسب Behrouz Ahadzadeh (19757022)

    منشور في 2024
    "…UniBFS exploits the inherent characteristic of binary algorithms-binary coding-to search the entire problem space for identifying relevant features while avoiding irrelevant ones. …"
  13. 13

    Topology design of switched enterprise networks using a fuzzy simulated evolution algorithm حسب Youssef, H.

    منشور في 2020
    "…The problem consists of deciding the number, types, and locations of the network active elements (hubs, switches, and routers), as well as the links and their capacities. …"
    احصل على النص الكامل
    article
  14. 14

    Topology design of switched enterprise networks using a fuzzy simulated evolution algorithm حسب Youssef, H.

    منشور في 2020
    "…The problem consists of deciding the number, types, and locations of the network active elements (hubs, switches, and routers), as well as the links and their capacities. …"
    احصل على النص الكامل
    article
  15. 15
  16. 16

    A Hash-Based Assessment and Recovery Algorithm for Distributed Healthcare Systems Using Blockchain Technology حسب Jaber, Mohammad

    منشور في 2020
    "…Here rises the need for an algorithm that can assess the damage that occurred before recovering the database back to its consistent state. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    masterThesis
  17. 17
  18. 18

    Multi-Objective Optimisation of Injection Moulding Process for Dashboard Using Genetic Algorithm and Type-2 Fuzzy Neural Network حسب Mohammad Reza Chalak Qazani (13893261)

    منشور في 2024
    "…Computational techniques, like the finite element method, are used to analyse behaviours based on varied input parameters. …"
  19. 19
  20. 20

    A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks حسب Umesh Kumar Lilhore (17727684)

    منشور في 2022
    "…The proposed energy-efficient routing protocol is based on an enhanced genetic algorithm and data fusion technique. In the proposed energy-efficient routing protocol, an existing genetic algorithm is enhanced by adding an encoding strategy, a crossover procedure, and an improved mutation operation that helps determine the nodes. …"