Search alternatives:
code » mode (Expand Search), core (Expand Search)
selection » detection (Expand Search)
Showing 1 - 11 results of 11 for search 'code ((encryption algorithm) OR (selection algorithm))', query time: 0.06s Refine Results
  1. 1

    UniBFS: A novel uniform-solution-driven binary feature selection algorithm for high-dimensional data by Behrouz Ahadzadeh (19757022)

    Published 2024
    “…To overcome these challenges, a new FS algorithm named Uniform-solution-driven Binary Feature Selection (UniBFS) has been developed in this study. …”
  2. 2

    Minimum traffic inter-BS SHO boundary selection algorithm for CDMA-based wireless networks by Abu-Amara, M.

    Published 2004
    “…An algorithm is presented to select an inter-base station soft handoff (inter-BS SHO) boundary for code division multiple access (CDMA)-based wireless networks. …”
    Get full text
    Get full text
    article
  3. 3

    Large language models for code completion: A systematic literature review by Rasha Ahmad Husein (19744756)

    Published 2024
    “…Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …”
  4. 4

    Gene selection for microarray data classification based on Gray Wolf Optimizer enhanced with TRIZ-inspired operators by Abu Zitar, Raed

    Published 2021
    “…DNA microarray technology is the fabrication of a single chip to contain a thousand genetic codes. Each microarray experiment can analyze many thousands of genes in parallel. …”
    Get full text
  5. 5
  6. 6
  7. 7

    COMPUTER AIDED PROGRAMMING EDUCATION (CAPE) by Al-Sukairi, Abdallah

    Published 2020
    “…CAPE consists of problem definition and algorithm construction modules. Algorithm construction module is currently supported with a facility to map an algorithm(s) into FORTRAN or Pascal code. …”
    Get full text
    article
  8. 8

    UML-based regression testing for OO software by Mansour, Nashat

    Published 2010
    “…Previous techniques have been mainly code-based and several of them have addressed procedural programs. …”
    Get full text
    Get full text
    Get full text
    article
  9. 9
  10. 10

    A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method by Shahid Rahman (16904613)

    Published 2022
    “…Additionally, the proposed approach achieved a 6.43 percent better score in PSNR with a variable measure of code inserted in similar images with distinct dimensions. …”
  11. 11

    Dynamic single node failure recovery in distributed storage systems by Itani, M.

    Published 2017
    “…We selected fractional repetition coding due to its simple repair mechanism that minimizes the repair and disk access bandwidths together with the property of un-coded repair process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article