Search alternatives:
method algorithm » mould algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
all algorithm » carlo algorithm (Expand Search), jaya algorithm (Expand Search), rd algorithm (Expand Search)
based all » based alloys (Expand Search)
element » elements (Expand Search)
method algorithm » mould algorithm (Expand Search)
code algorithm » cosine algorithm (Expand Search), rd algorithm (Expand Search), colony algorithm (Expand Search)
all algorithm » carlo algorithm (Expand Search), jaya algorithm (Expand Search), rd algorithm (Expand Search)
based all » based alloys (Expand Search)
element » elements (Expand Search)
-
1
Data Embedding in HEVC Video by Modifying the Partitioning of Coding Units
Published 2019Subjects: Get full text
article -
2
-
3
-
4
Development of an Optimization Algorithm for Internet Data Traffic
Published 2020“…The algorithm monitors data repetitions in IP datagram and prepares a compression code in response of this repetition. …”
Get full text
article -
5
Intelligent Rapidly-Exploring Random Tree Star Algorithm
Published 2024Get full text
doctoralThesis -
6
-
7
Practical single node failure recovery using fractional repetition codes in data centers
Published 2016“…FR codes consist of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
8
-
9
-
10
-
11
A matrix-based damage assessment and recovery algorithm
Published 2014“…To make the process of damage assessment and recovery fast and effective (not scanning the entire log), researchers have proposed different methods for segmenting the log file, and accordingly presented different damage assessment and recovery algorithms. In this work we present efficient damage assessment and recovery algorithms to recover from malicious transactions in a database based on the concept of the matrix. …”
Get full text
Get full text
Get full text
conferenceObject -
12
A reduced model for phase-change problems with radiation using simplified PN approximations
Published 2025“…A Newton-based algorithm is also adopted for solving the nonlinear systems resulting from the considered monolithic approach. …”
Get full text
article -
13
UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data
Published 2024“…UniBFS exploits the inherent characteristic of binary algorithms-binary coding-to search the entire problem space for identifying relevant features while avoiding irrelevant ones. …”
-
14
Extended Behavioral Modeling of FET and Lattice-Mismatched HEMT Devices
Published 2016Subjects: Get full text
doctoralThesis -
15
-
16
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
17
-
18
A new simulated annealing-based tabu search algorithm for unitcommitment
Published 1997Get full text
Get full text
article -
19
Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study
Published 2021“…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …”
Get full text
article -
20
Enhancement of blocking performance in all-optical WDM networks. (c2012)
Published 2012Get full text
Get full text
masterThesis