Search alternatives:
research algorithm » search algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
research algorithm » search algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
-
141
Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks
Published 2023“…The simulation results show that the proposed algorithm outperforms the above-mentioned reference algorithms in all evaluation metrics and is proved to be comparable to the optimal solution given its low complexity.…”
-
142
-
143
A Hardware Model of an Expandable RSA Cryptogrsphic System
Published 1998“…Data security is an important aspect of information transmission and storage in an electronic form. …”
Get full text
masterThesis -
144
Transmission Line Fault Location Using Unsynchronized Measurements
Published 2013Get full text
doctoralThesis -
145
A Data-Driven Decision-Making Framework for Fleet Management in the Government Sector of Dubai
Published 2024“…Data-driven decision-making has become increasingly widespread and relevant across all business areas, including private and public sectors. My research aims to develop a data-driven decision support framework for fleet management, focusing on leveraging advanced algorithms, including decision trees and random forests, to generate domain-specific AI models. …”
Get full text
-
146
Modelling of pollutant transport in compound open channels
Published 1998“…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …”
Get full text
Get full text
masterThesis -
147
Hardware Model of an Expandable RSA Cryptographic System
Published 1998“…Data security is an important aspect of information transmission and storage in an electronic form. …”
Get full text
Get full text
Get full text
masterThesis -
148
Modeling and Guidance of an Underactuated Autonomous Underwater Vehicle
Published 2017Get full text
doctoralThesis -
149
-
150
-
151
A method for optimizing test bus assignment and sizing for system-on-a-chip
Published 2017Get full text
Get full text
Get full text
Get full text
conferenceObject -
152
Joint computing, communication and cost-aware task offloading in D2D-enabled Het-MEC
Published 2022“…We formulate and solve the optimal allocation strategy then decompose the problem into two sub-problems in an attempt to reduce its complexity. Furthermore, we propose a low-complexity algorithm that generates high performance results and can be applied for large-scale networks. …”
Get full text
Get full text
Get full text
Get full text
article -
153
-
154
ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks
Published 2022“…In this paper, we propose data-driven machine learning (ML) schemes to efficiently solve these problems in wireless LAN (WLAN) networks. …”
-
155
Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review
Published 2024“…During the training phase, machine-learning systems may face challenges due to the large amount of data required and the complex nature of the training procedure. …”
-
156
Optimized provisioning of edge computing resources with heterogeneous workload in IoT networks
Published 2019“…In addition, the considerable amount of data they generate brings extra burden to the existing wireless network infrastructure. …”
Get full text
Get full text
Get full text
Get full text
article -
157
Approximate XML structure validation technical report
Published 2014Get full text
Get full text
Get full text
article -
158
Automatic Recognition of Poets for Arabic Poetry using Deep Learning Techniques (LSTM and Bi-LSTM)
Published 2024“…LSTM has proven its capability for sequential data analysis in many different languages. Our reported results have shown promising classification accuracy with an average of 92.35%. …”
Get full text
-
159
Assessment of static pile design methods and non-linear analysis of pile driving
Published 2006“…The pile/soil interaction system is described by a mass/spring/dashpot system where the properties of each component are derived from rigorous analytical solutions or finite element analysis. The outcome of this research is an algorithm that can be used to predict pile displacement and driving stresses. …”
Get full text
Get full text
Get full text
masterThesis -
160
Uplink Noma in UAV-Assisted IoT Networks
Published 2022“…The first part of the thesis considers the problem of data collection from time-constrained IoT devices through deploying a UAV with uplink NOMA. …”
Get full text
Get full text
Get full text
masterThesis