Search alternatives:
using algorithm » cosine algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
develop » developed (Expand Search)
element » elements (Expand Search)
Showing 741 - 760 results of 892 for search '(((( develop based algorithm ) OR ( element rd algorithm ))) OR ( data using algorithm ))', query time: 0.10s Refine Results
  1. 741
  2. 742
  3. 743

    Anonymizing multimedia documents by Haraty, Ramzi

    Published 2016
    “…In this paper, we propose de-linkability, a privacy-preserving constraint to bound the amount of information outsourced that can be used to re-identify individuals. We provide a sanitizing MD∗-algorithm to enforce de-linkability along with a utility function to evaluate the utility of multimedia documents that is preserved after the sanitizing process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  4. 744

    On the Generation of Quantified Lemmas by Gabriel Ebner (23277217)

    Published 2018
    “…This solution yields a sequence of lemmas and, finally, a proof based on these lemmas. Various techniques are developed to simplify the canonical solution resulting in a reduction of proof complexity. …”
  5. 745
  6. 746

    An Intelligent and Low-Cost Eye-Tracking System for Motorized Wheelchair Control by Mahmoud Dahmani (18810247)

    Published 2020
    “…To accomplish such a feat, four user-specific methods were developed, implemented, and tested; all of which were based on a benchmark database created by the authors. …”
  7. 747
  8. 748
  9. 749

    Structural similarity evaluation between XML documents and DTDs by Tekli, J.

    Published 2007
    “…The automatic processing and management of XML-based data are ever more popular research issues due to the increasing abundant use of XML, especially on the Web. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  10. 750

    An Infrastructure-Assisted Crowdsensing Approach for On-Demand Traffic Condition Estimation by Abdul Rahman, Sawsan

    Published 2019
    “…However, the current solutions proposed for the use of crowdsensing for the collection of traffic related data adopt an opportunistic continuous sensing approach, which entails high resource consumption on the server and mobile device side, a high communication overhead, while offering little control of the users over the sensing activity. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  11. 751

    ARDENT: A Proactive Agent-Based Routing Protocol for Internet of Vehicles by Mazouzi, Mohamed

    Published 2023
    “…The design of an efficient routing algorithm for the Internet of Vehicles (IoV) poses several problems due to its special characteristics, including nodes high-speed mobility, frequent topology change, link instability, and the presence of radio obstacles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  12. 752

    Artificial Intelligence–Driven Serious Games in Health Care: Scoping Review by Alaa Abd-alrazaq (17058018)

    Published 2022
    “…Three reviewers independently extracted data from the included studies. A narrative approach was used for data synthesis.…”
  13. 753

    Common weaving approach in mainstream languages for software security hardening by Alhadidi, Dima

    Published 2013
    “…In this paper, we propose a novel aspect-oriented approach based on GIMPLE, a language-independent and a tree-based representation generated by the GNU Compiler Collection (GCC), for the systemization of application security hardening. …”
    Get full text
    Get full text
    Get full text
    article
  14. 754
  15. 755

    From Collatz Conjecture to chaos and hash function by Masrat Rasool (17807813)

    Published 2023
    “…The primary goal of this research is to develop a robust and efficient chaos-based hash function that addresses the requirements of cryptographic systems. …”
  16. 756
  17. 757

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying by Tekli, Joe

    Published 2023
    “…Dedicated weighting functions and various search algorithms have been developed for that purpose and will be presented here. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  18. 758

    Block constrained pressure residual preconditioning for two-phase flow in porous media by mixed hybrid finite elements by Stefano Nardean (14151900)

    Published 2023
    “…An original MHFE-based formulation of the two-phase flow model is taken as a reference for the development of the BCPR preconditioner, in which the set of system unknowns comprises both element and face pressures, in addition to the cell saturations, resulting in a $$3\times 3$$ 3 × 3 block-structured Jacobian matrix with a $$2\times 2$$ 2 × 2 inner pressure problem. …”
  19. 759
  20. 760