Search alternatives:
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
search » research (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
data algorithm » jaya algorithm (Expand Search), deer algorithm (Expand Search)
search » research (Expand Search)
-
141
Digital Image Watermarking Using Balanced Multiwavelets
Published 2006“…In this paper, a robust watermarking algorithm using balanced multiwavelet transform is proposed. …”
Get full text
article -
142
Oversampling techniques for imbalanced data in regression
Published 2024“…For image datasets, we employ Multi-Level Autoencoders, consisting of Convolutional and Fully Connected Autoencoders. …”
-
143
Blockchain-Based Decentralized Architecture for Software Version Control
Published 2023“…The proof of authority (PoA) consensus algorithm will be used to approve the developer communicating modifications to the private blockchain network; the authority will only provide permission and will not be able to add, edit, or delete code files. …”
-
144
Resource allocation scheme for eMBB and uRLLC coexistence in 6G networks
Published 2023“…The simulation results show that the proposed algorithm outperforms the above-mentioned reference algorithms in all evaluation metrics and is proved to be comparable to the optimal solution given its low complexity.…”
-
145
A Hardware Model of an Expandable RSA Cryptogrsphic System
Published 1998“…Data security is an important aspect of information transmission and storage in an electronic form. …”
Get full text
masterThesis -
146
Transmission Line Fault Location Using Unsynchronized Measurements
Published 2013Get full text
doctoralThesis -
147
Structural similarity evaluation between XML documents and DTDs
Published 2007“…It is of polynomial complexity, in comparison with existing exponential algorithms. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
148
Modelling of pollutant transport in compound open channels
Published 1998“…The numerical computation of open-channel flows requires preparing and processing larger volumes of boundary and bathymetry data for computer inputs and the development of numerical algorithms for treating complex boundary condition, channel properties, and free surface effects. …”
Get full text
Get full text
masterThesis -
149
Hardware Model of an Expandable RSA Cryptographic System
Published 1998“…Data security is an important aspect of information transmission and storage in an electronic form. …”
Get full text
Get full text
Get full text
masterThesis -
150
Joint computing, communication and cost-aware task offloading in D2D-enabled Het-MEC
Published 2022“…We formulate and solve the optimal allocation strategy then decompose the problem into two sub-problems in an attempt to reduce its complexity. Furthermore, we propose a low-complexity algorithm that generates high performance results and can be applied for large-scale networks. …”
Get full text
Get full text
Get full text
Get full text
article -
151
-
152
ML-Based Handover Prediction and AP Selection in Cognitive Wi-Fi Networks
Published 2022“…In this paper, we propose data-driven machine learning (ML) schemes to efficiently solve these problems in wireless LAN (WLAN) networks. …”
-
153
Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review
Published 2024“…During the training phase, machine-learning systems may face challenges due to the large amount of data required and the complex nature of the training procedure. …”
-
154
Optimized provisioning of edge computing resources with heterogeneous workload in IoT networks
Published 2019“…In addition, the considerable amount of data they generate brings extra burden to the existing wireless network infrastructure. …”
Get full text
Get full text
Get full text
Get full text
article -
155
Automatic Recognition of Poets for Arabic Poetry using Deep Learning Techniques (LSTM and Bi-LSTM)
Published 2024“…LSTM has proven its capability for sequential data analysis in many different languages. Our reported results have shown promising classification accuracy with an average of 92.35%. …”
Get full text
-
156
-
157
Uplink Noma in UAV-Assisted IoT Networks
Published 2022“…The first part of the thesis considers the problem of data collection from time-constrained IoT devices through deploying a UAV with uplink NOMA. …”
Get full text
Get full text
Get full text
masterThesis -
158
Integrated whole transcriptome and small RNA analysis revealed multiple regulatory networks in colorectal cancer
Published 2021“…IPA in combination with in silico prediction algorithms and experimentally validated databases gave insight into the complex associations and interactions between downregulated miRNAs and upregulated mRNAs in CRC and vice versa. …”
-
159
Cognitive Load Estimation Using a Hybrid Cluster-Based Unsupervised Machine Learning Technique
Published 2024“…The primary objective of this study is to estimate the CL index through an innovative approach that employs a hybrid, cluster-based, unsupervised learning technique seamlessly integrated with a 1D Convolutional Neural Network (CNN) architecture tailored for automated feature extraction, rather than conventional supervised algorithms, which facilitated in the acquisition of latent complex patterns without the need for manual categorization. …”
-
160
Iterative Methods for the Solution of a Steady State Biofilter Model
Published 2017Get full text
doctoralThesis