Search alternatives:
code encryption » secure encryption (Expand Search)
Showing 1 - 20 results of 23 for search '(( code ((detection algorithm) OR (selection algorithm)) ) OR ( code encryption algorithm ))', query time: 0.09s Refine Results
  1. 1

    UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data by Behrouz Ahadzadeh (19757022)

    Published 2024
    “…To overcome these challenges, a new FS algorithm named Uniform-solution-driven Binary Feature Selection (UniBFS) has been developed in this study. …”
  2. 2

    A decoding algorithm for I-Q space-time coded systems in fadingenvironments by Zummo, S.A.

    Published 2000
    “…Simulation results showed that I-Q ST codes with the new algorithm provide coding gains over ST codes having the same complexity but with a single encoder…”
    Get full text
    Get full text
    article
  3. 3
  4. 4

    Minimum traffic inter-BS SHO boundary selection algorithm for CDMA-based wireless networks by Abu-Amara, M.

    Published 2004
    “…An algorithm is presented to select an inter-base station soft handoff (inter-BS SHO) boundary for code division multiple access (CDMA)-based wireless networks. …”
    Get full text
    Get full text
    article
  5. 5

    CNN and HEVC Video Coding Features for Static Video Summarization by Issa, Obada

    Published 2022
    “…The proposed solutions are compared with existing works based on an SIFT flow algorithm that uses CNN features. Subsequently, an optional dimensionality reduction based on stepwise regression was applied to the feature vectors prior to detecting key frames. …”
    Get full text
    article
  6. 6

    Large language models for code completion: A systematic literature review by Rasha Ahmad Husein (19744756)

    Published 2024
    “…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …”
  7. 7
  8. 8

    Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators by Abu Zitar, Raed

    Published 2021
    “…DNA microarray technology is the fabrication of a single chip to contain a thousand genetic codes. Each microarray experiment can analyze many thousands of genes in parallel. …”
    Get full text
  9. 9
  10. 10

    Left Ventricular Wall Motion Estimation by Active Polynomials for Acute Myocardial Infarction Detection by Serkan Kiranyaz (3762058)

    Published 2020
    “…It further enables medical experts to gain an enhanced visualization capability of echo images through color-coded segments along with their “maximum motion displacement” plots helping them to better assess wall motion and LV Ejection-Fraction (LVEF). …”
  11. 11
  12. 12
  13. 13

    COMPUTER AIDED PROGRAMMING EDUCATION (CAPE) by Al-Sukairi, Abdallah

    Published 2020
    “…CAPE consists of problem definition and algorithm construction modules. Algorithm construction module is currently supported with a facility to map an algorithm(s) into FORTRAN or Pascal code. …”
    Get full text
    article
  14. 14

    Downlink channel estimation for IMT-DS by Faisal, S.

    Published 2001
    “…IMT-DS system is an approved terrestrial radio interface standard for 3G mobile communication based on direct sequence code division multiple access (DS-CDMA). It employs a RAKE receiver to exploit multipath diversity. …”
    Get full text
    Get full text
    article
  15. 15

    UML-based regression testing for OO software by Mansour, Nashat

    Published 2010
    “…For the second phase, we present algorithms for detecting system level changes in the interaction overview diagram. …”
    Get full text
    Get full text
    Get full text
    article
  16. 16

    BIT-SLICE MICROPROCESSOR-BASED COMMUNICATIONS DECODER by SOOMRO, AA

    Published 2020
    “…To augment the throughput of the decoder for realtime decoding, the ALU word length is chosen to be equal to that of a code word and the decoding operation is accomplished in two steps, i.e. error detection and error correction. …”
    Get full text
    article
  17. 17

    MSLP: mRNA subcellular localization predictor based on machine learning techniques by Saleh Musleh (15279190)

    Published 2023
    “…</p><h3>Availability</h3><p dir="ltr">We have implemented a Docker container and API for end users to run their sequences on our model. Datasets, the code of API and the Docker are shared for the community in GitHub at: https://github.com/smusleh/MSLP.…”
  18. 18

    Analysis of Using Machine Learning to Enhance the Efficiency of Facilities Management in the UAE by ULLAH, SAAD

    Published 2022
    “…Seasonal thresholds are set for sensor values, and the algorithm detects hazardous trends when values exceed safe limits, correlating them with related sensors to generate combined variables and error codes. …”
    Get full text
  19. 19

    A GENERAL REAL-TIME DECODER BASED ON AMD2900 DEVICES by SOOMRO, AA

    Published 2020
    “…First, bit-slice microprocessors are used and ALU word length is chosen to be equal to that of a code word. Second, decoding operation is accomplished in two steps, namely (1) Error detection and (2) Error correction. …”
    Get full text
    article
  20. 20

    Developing an online hate classifier for multiple social media platforms by Joni Salminen (7434770)

    Published 2020
    “…We then experiment with several classification algorithms (Logistic Regression, Naïve Bayes, Support Vector Machines, XGBoost, and Neural Networks) and feature representations (Bag-of-Words, TF-IDF, Word2Vec, BERT, and their combination). …”